Vulnerabilites related to microsoft - visual_studio_2022
cve-2024-43484
Vulnerability from cvelistv5
Published
2024-10-08 17:35
Modified
2025-03-28 15:03
Summary
.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
Impacted products
Vendor Product Version
Microsoft PowerShell 7.2 Version: 7.2.0   < 7.2.24
Create a notification for this product.
   Microsoft PowerShell 7.4 Version: 7.4.0   < 7.4.6
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.20
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.8 Version: 17.8.0   < 17.8.15
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.10 Version: 17.10   < 17.10.8
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.11 Version: 17.11   < 17.11.5
Create a notification for this product.
   Microsoft .NET 6.0 Version: 6.0.0   < 6.0.35
Create a notification for this product.
   Microsoft .NET 8.0 Version: 8.0.0   < 8.0.10
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.7.2 Version: 4.7.0   < 4.7.04115.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8 Version: 4.8.0   < 4.8.04762.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 Version: 4.7.0   < 4.7.04115.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8.1 Version: 4.8.1   < 4.8.1.9277.03
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2 Version: 4.7.0   < 4.7.04115.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6/4.6.2 Version: 10.0.0.0   < 10.0.10240.20796
Create a notification for this product.
   Microsoft Microsoft .NET Framework 2.0 Service Pack 2 Version: 2.0.0   < 3.0.30729.8974
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.0 Service Pack 2 Version: 3.0.0   < 3.0.30729.8974
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 Version: 3.5.0   < 3.5.30729.8973
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5.1 Version: 3.5.0   < 3.5.1.30729.8974
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.8 Version: 4.8.0   < 4.8.04762.01
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-43484",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-08T18:54:47.769303Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-09T19:48:20.527Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2025-03-28T15:03:03.559Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  url: "https://security.netapp.com/advisory/ntap-20250328-0007/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.24",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.4.6",
                     status: "affected",
                     version: "7.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.20",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.15",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.8",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.11",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.11.5",
                     status: "affected",
                     version: "17.11",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.35",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.10",
                     status: "affected",
                     version: "8.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows Server 2016",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows Server 2019",
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows 10 Version 1607 for x64-based Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04115.01",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows Server 2019",
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.04762.01",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2012",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2 (Server Core installation)",
                  "Windows Server 2012 R2",
               ],
               product: "Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04115.01",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2022",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 11 Version 22H2 for x64-based Systems",
                  "Windows 11 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 11 Version 23H2 for ARM64-based Systems",
                  "Windows 11 Version 23H2 for x64-based Systems",
                  "Windows Server 2022, 23H2 Edition (Server Core installation)",
                  "Windows 11 Version 24H2 for ARM64-based Systems",
                  "Windows 11 Version 24H2 for x64-based Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.1.9277.03",
                     status: "affected",
                     version: "4.8.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04115.01",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 for x64-based Systems",
                  "Windows 10 for 32-bit Systems",
               ],
               product: "Microsoft .NET Framework 4.6/4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.10240.20796",
                     status: "affected",
                     version: "10.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 2.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8974",
                     status: "affected",
                     version: "2.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 3.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8974",
                     status: "affected",
                     version: "3.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
                  "Windows Server 2012",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.5.30729.8973",
                     status: "affected",
                     version: "3.5.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.5.1.30729.8974",
                     status: "affected",
                     version: "3.5.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2012",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016",
                  "Windows Server 2012 R2",
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows Server 2012 R2 (Server Core installation)",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
               ],
               product: "Microsoft .NET Framework 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.04762.01",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.24",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.4.6",
                           versionStartIncluding: "7.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.20",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.15",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.8",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.11.5",
                           versionStartIncluding: "17.11",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.35",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.10",
                           versionStartIncluding: "8.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04115.01",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.04762.01",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04115.01",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.1.9277.03",
                           versionStartIncluding: "4.8.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04115.01",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.10240.20796",
                           versionStartIncluding: "10.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8974",
                           versionStartIncluding: "2.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8974",
                           versionStartIncluding: "3.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.5.30729.8973",
                           versionStartIncluding: "3.5.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.5.1.30729.8974",
                           versionStartIncluding: "3.5.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.04762.01",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-10-08T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-407",
                     description: "CWE-407: Inefficient Algorithmic Complexity",
                     lang: "en-US",
                     type: "CWE",
                  },
                  {
                     cweId: "CWE-789",
                     description: "CWE-789: Memory Allocation with Excessive Size Value",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-29T23:50:33.358Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43484",
            },
         ],
         title: ".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-43484",
      datePublished: "2024-10-08T17:35:46.715Z",
      dateReserved: "2024-08-14T01:08:33.518Z",
      dateUpdated: "2025-03-28T15:03:03.559Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-38171
Vulnerability from cvelistv5
Published
2023-10-10 17:07
Modified
2025-04-14 22:45
Summary
Microsoft QUIC Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:30:14.169Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Microsoft QUIC Denial of Service Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38171",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-38171",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-26T21:50:15.369465Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-27T20:44:45.977Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.21",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.13",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.9",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.7",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.7.6",
                     status: "affected",
                     version: "17.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Windows Server 2022",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.20348.2031",
                     status: "affected",
                     version: "10.0.20348.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
                  "ARM64-based Systems",
               ],
               product: "Windows 11 version 21H2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.22000.2538",
                     status: "affected",
                     version: "10.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "ARM64-based Systems",
                  "x64-based Systems",
               ],
               product: "Windows 11 version 22H2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.22621.2428",
                     status: "affected",
                     version: "10.0.22621.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.13",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.3.9",
                     status: "affected",
                     version: "7.3.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.21",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.13",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.9",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.7.6",
                           versionStartIncluding: "17.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.20348.2031",
                           versionStartIncluding: "10.0.20348.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "10.0.22000.2538",
                           versionStartIncluding: "10.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*",
                           versionEndExcluding: "10.0.22621.2428",
                           versionStartIncluding: "10.0.22621.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.13",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.3.9",
                           versionStartIncluding: "7.3.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-10-10T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft QUIC Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-476",
                     description: "CWE-476: NULL Pointer Dereference",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-04-14T22:45:47.105Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft QUIC Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38171",
            },
         ],
         title: "Microsoft QUIC Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-38171",
      datePublished: "2023-10-10T17:07:23.843Z",
      dateReserved: "2023-07-12T23:41:45.863Z",
      dateUpdated: "2025-04-14T22:45:47.105Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-28937
Vulnerability from cvelistv5
Published
2024-04-09 17:01
Modified
2025-01-23 01:12
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft SQL Server 2019 (GDR) Version: 15.0.0   < 15.0.2110.4
Create a notification for this product.
   Microsoft Microsoft SQL Server 2022 (GDR) Version: 16.0.0   < 16.0.1115.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Windows Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Linux Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on MacOS Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Windows Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Linux Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on MacOS Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft SQL Server 2019 (CU 25) Version: 15.0.0   < 15.0.4360.2
Create a notification for this product.
   Microsoft Microsoft SQL Server 2022 for (CU 12) Version: 16.0.0   < 16.0.4120.1
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Version: 16.11.0   < 16.11.35
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.18
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.9 Version: 17.0   < 17.9.6
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.14
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.8 Version: 17.8.0   < 17.8.9
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-28937",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-22T20:00:06.674591Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T18:03:48.747Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T01:03:51.267Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28937",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.2110.4",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.1115.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (CU 25)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.4360.2",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 for (CU 12)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.4120.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.35",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.18",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.9",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.9.6",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.14",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.9",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.2110.4",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.1115.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.4360.2",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.4120.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.35",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.18",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.9.6",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.14",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.9",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-04-09T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "CWE-122: Heap-based Buffer Overflow",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-23T01:12:06.910Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28937",
            },
         ],
         title: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-28937",
      datePublished: "2024-04-09T17:01:15.620Z",
      dateReserved: "2024-03-13T01:26:53.037Z",
      dateUpdated: "2025-01-23T01:12:06.910Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-28934
Vulnerability from cvelistv5
Published
2024-04-09 17:01
Modified
2025-01-23 01:12
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft SQL Server 2022 for (CU 12) Version: 16.0.0   < 16.0.4120.1
Create a notification for this product.
   Microsoft Microsoft SQL Server 2019 (CU 25) Version: 15.0.0   < 15.0.4360.2
Create a notification for this product.
   Microsoft Microsoft SQL Server 2019 (GDR) Version: 15.0.0   < 15.0.2110.4
Create a notification for this product.
   Microsoft Microsoft SQL Server 2022 (GDR) Version: 16.0.0   < 16.0.1115.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Windows Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Linux Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on MacOS Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Windows Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Linux Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on MacOS Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Version: 16.11.0   < 16.11.35
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.18
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.9 Version: 17.0   < 17.9.6
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.14
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.8 Version: 17.8.0   < 17.8.9
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.0:*:*:*:*:linux:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "odbc_driver_for_sql_server",
                  vendor: "microsoft",
                  versions: [
                     {
                        lessThan: "18.3.3.1",
                        status: "affected",
                        version: "18.0",
                        versionType: "semver",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:microsoft:sql_server:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "sql_server",
                  vendor: "microsoft",
                  versions: [
                     {
                        status: "affected",
                        version: "15.0.2000.5",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-28934",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-23T15:04:37.242018Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T18:03:16.066Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T01:03:51.518Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28934",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 for (CU 12)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.4120.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (CU 25)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.4360.2",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.2110.4",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.1115.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.35",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.18",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.9",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.9.6",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.14",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.9",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.4120.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.4360.2",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.2110.4",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.1115.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.35",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.18",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.9.6",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.14",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.9",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-04-09T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-121",
                     description: "CWE-121: Stack-based Buffer Overflow",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-23T01:12:05.878Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28934",
            },
         ],
         title: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-28934",
      datePublished: "2024-04-09T17:01:14.516Z",
      dateReserved: "2024-03-13T01:26:53.036Z",
      dateUpdated: "2025-01-23T01:12:05.878Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-38180
Vulnerability from cvelistv5
Published
2023-08-08 18:52
Modified
2025-02-26 16:45
Summary
.NET and Visual Studio Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-38180",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-24T20:42:20.831219Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2023-08-09",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-38180",
                     },
                     type: "kev",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-400",
                        description: "CWE-400 Uncontrolled Resource Consumption",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-26T16:45:17.788Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:30:14.113Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET and Visual Studio Denial of Service Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "ASP.NET Core 2.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "2.1.40",
                     status: "affected",
                     version: "2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.21",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.10",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.18",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.10",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.6",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "2.1.40",
                           versionStartIncluding: "2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.21",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.10",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.18",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.10",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.6",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-08-08T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T01:59:15.326Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180",
            },
         ],
         title: ".NET and Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-38180",
      datePublished: "2023-08-08T18:52:31.790Z",
      dateReserved: "2023-07-12T23:41:45.867Z",
      dateUpdated: "2025-02-26T16:45:17.788Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36038
Vulnerability from cvelistv5
Published
2023-11-14 21:35
Modified
2025-01-01 02:16
Summary
ASP.NET Core Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-36038",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2023-12-03T02:09:07.366234Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-18T21:00:12.308Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T16:37:41.272Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "ASP.NET Core Denial of Service Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36038",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "ASP.NET Core 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.0",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.22",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.14",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.10",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.7",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.7.7",
                     status: "affected",
                     version: "17.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.0",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.0",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.22",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.14",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.10",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.7.7",
                           versionStartIncluding: "17.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.0",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-11-14T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "ASP.NET Core Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.2,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-400",
                     description: "CWE-400: Uncontrolled Resource Consumption",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T02:16:13.387Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "ASP.NET Core Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36038",
            },
         ],
         title: "ASP.NET Core Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-36038",
      datePublished: "2023-11-14T21:35:48.071Z",
      dateReserved: "2023-06-20T20:44:39.827Z",
      dateUpdated: "2025-01-01T02:16:13.387Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-26190
Vulnerability from cvelistv5
Published
2024-03-12 16:57
Modified
2024-12-31 20:19
Summary
Microsoft QUIC Denial of Service Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft Visual Studio 2022 version 17.9 Version: 17.0   < 17.9.3
Create a notification for this product.
   Microsoft Windows Server 2022 Version: 10.0.20348.0   < 10.0.20348.2340
Create a notification for this product.
   Microsoft Windows 11 version 21H2 Version: 10.0.0   < 10.0.22000.2836
Create a notification for this product.
   Microsoft Windows 11 version 22H2 Version: 10.0.22621.0   < 10.0.22621.3296
Create a notification for this product.
   Microsoft Windows 11 version 22H3 Version: 10.0.22631.0   < 10.0.22631.3296
Create a notification for this product.
   Microsoft Windows 11 Version 23H2 Version: 10.0.22631.0   < 10.0.22631.3296
Create a notification for this product.
   Microsoft Windows Server 2022, 23H2 Edition (Server Core installation) Version: 10.0.25398.0   < 10.0.25398.763
Create a notification for this product.
   Microsoft PowerShell 7.3 Version: 7.3.0   < 7.3.12
Create a notification for this product.
   Microsoft PowerShell 7.4 Version: 7.4.0   < 7.4.2
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.17
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.13
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.8 Version: 17.8.0   < 17.8.8
Create a notification for this product.
   Microsoft .NET 7.0 Version: 7.0.0   < 7.0.17
Create a notification for this product.
   Microsoft .NET 8.0 Version: 1.0.0   < 8.0.3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-26190",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-03-12T18:40:23.257976Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-12T18:20:58.065Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T23:59:32.659Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Microsoft QUIC Denial of Service Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26190",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.9",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.9.3",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Windows Server 2022",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.20348.2340",
                     status: "affected",
                     version: "10.0.20348.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
                  "ARM64-based Systems",
               ],
               product: "Windows 11 version 21H2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.22000.2836",
                     status: "affected",
                     version: "10.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "ARM64-based Systems",
                  "x64-based Systems",
               ],
               product: "Windows 11 version 22H2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.22621.3296",
                     status: "affected",
                     version: "10.0.22621.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "ARM64-based Systems",
               ],
               product: "Windows 11 version 22H3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.22631.3296",
                     status: "affected",
                     version: "10.0.22631.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Windows 11 Version 23H2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.22631.3296",
                     status: "affected",
                     version: "10.0.22631.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Windows Server 2022, 23H2 Edition (Server Core installation)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.25398.763",
                     status: "affected",
                     version: "10.0.25398.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.3.12",
                     status: "affected",
                     version: "7.3.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.4.2",
                     status: "affected",
                     version: "7.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.17",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.13",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.8",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.17",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.3",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.9.3",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.20348.2340",
                           versionStartIncluding: "10.0.20348.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "10.0.22000.2836",
                           versionStartIncluding: "10.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*",
                           versionEndExcluding: "10.0.22621.3296",
                           versionStartIncluding: "10.0.22621.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*",
                           versionEndExcluding: "10.0.22631.3296",
                           versionStartIncluding: "10.0.22631.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "10.0.22631.3296",
                           versionStartIncluding: "10.0.22631.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.25398.763",
                           versionStartIncluding: "10.0.25398.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.3.12",
                           versionStartIncluding: "7.3.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.4.2",
                           versionStartIncluding: "7.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.17",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.13",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.8",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.17",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.3",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-03-12T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft QUIC Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-400",
                     description: "CWE-400: Uncontrolled Resource Consumption",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-31T20:19:19.041Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft QUIC Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26190",
            },
         ],
         title: "Microsoft QUIC Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-26190",
      datePublished: "2024-03-12T16:57:52.923Z",
      dateReserved: "2024-02-14T22:23:54.099Z",
      dateUpdated: "2024-12-31T20:19:19.041Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-30184
Vulnerability from cvelistv5
Published
2022-06-15 21:52
Modified
2025-02-28 19:57
Summary
.NET and Visual Studio Information Disclosure Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T06:40:47.782Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30184",
               },
               {
                  name: "FEDORA-2022-cd37732349",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWNH4AC3LFVX35MDRX5OBZDGD2AMH66K/",
               },
               {
                  name: "FEDORA-2022-5508547b1e",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMP34G53EA2DBTBLFOAQCDZRRENE2EA2/",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-30184",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-28T19:25:47.451932Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-200",
                        description: "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-28T19:57:01.224Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.6",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET Core 3.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.1.26",
                     status: "affected",
                     version: "3.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.9.22",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Visual Studio 2019 for Mac version 8.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.2",
                     status: "affected",
                     version: "8.1.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.16",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.11",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.4",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "NuGet.exe",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.2.0",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Visual Studio 2022 for Mac version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.2",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.6",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.1.26",
                           versionStartIncluding: "3.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.9.22",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:macos:*:*",
                           versionEndExcluding: "17.0.2",
                           versionStartIncluding: "8.1.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.16",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.11",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.4",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:nuget:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.2.0",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.2",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2022-06-14T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Information Disclosure Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-02T19:03:10.967Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Information Disclosure Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30184",
            },
         ],
         title: ".NET and Visual Studio Information Disclosure Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2022-30184",
      datePublished: "2022-06-15T21:52:20.000Z",
      dateReserved: "2022-05-03T00:00:00.000Z",
      dateUpdated: "2025-02-28T19:57:01.224Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-28931
Vulnerability from cvelistv5
Published
2024-04-09 17:00
Modified
2025-01-23 01:11
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft SQL Server 2022 for (CU 12) Version: 16.0.0   < 16.0.4120.1
Create a notification for this product.
   Microsoft Microsoft SQL Server 2019 (CU 25) Version: 15.0.0   < 15.0.4360.2
Create a notification for this product.
   Microsoft Microsoft SQL Server 2019 (GDR) Version: 15.0.0   < 15.0.2110.4
Create a notification for this product.
   Microsoft Microsoft SQL Server 2022 (GDR) Version: 16.0.0   < 16.0.1115.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Windows Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Linux Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on MacOS Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Windows Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Linux Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on MacOS Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Version: 16.11.0   < 16.11.35
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.9 Version: 17.0   < 17.9.6
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.18
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.14
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.8 Version: 17.8.0   < 17.8.9
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-28931",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-25T00:11:41.299849Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T18:03:59.642Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T01:03:51.172Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28931",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 for (CU 12)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.4120.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (CU 25)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.4360.2",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.2110.4",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.1115.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.35",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.9",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.9.6",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.18",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.14",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.9",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.4120.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.4360.2",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.2110.4",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.1115.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.35",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.9.6",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.18",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.14",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.9",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-04-09T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-190",
                     description: "CWE-190: Integer Overflow or Wraparound",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-23T01:11:22.456Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28931",
            },
         ],
         title: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-28931",
      datePublished: "2024-04-09T17:00:27.649Z",
      dateReserved: "2024-03-13T01:26:53.031Z",
      dateUpdated: "2025-01-23T01:11:22.456Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2025-21173
Vulnerability from cvelistv5
Published
2025-01-14 18:04
Modified
2025-04-02 13:23
Summary
.NET Elevation of Privilege Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2025-21173",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-15T19:17:43.370703Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-15T19:17:54.375Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.12",
                     status: "affected",
                     version: "8.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 9.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "9.0.1",
                     status: "affected",
                     version: "9.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.12",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.12.4",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.22",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.17",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.10",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.12",
                           versionStartIncluding: "8.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "9.0.1",
                           versionStartIncluding: "9.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.12.4",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.22",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.17",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.10",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2025-01-14T08:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.3,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-379",
                     description: "CWE-379: Creation of Temporary File in Directory with Insecure Permissions",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-04-02T13:23:37.565Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21173",
            },
         ],
         title: ".NET Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2025-21173",
      datePublished: "2025-01-14T18:04:02.074Z",
      dateReserved: "2024-12-05T21:43:30.760Z",
      dateUpdated: "2025-04-02T13:23:37.565Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2025-21206
Vulnerability from cvelistv5
Published
2025-02-11 17:58
Modified
2025-03-12 01:42
Summary
Visual Studio Installer Elevation of Privilege Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2025-21206",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-11T19:17:19.452159Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-11T19:30:49.108Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.70",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.44",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.18",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.11",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.12",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.12.5",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.70",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.44",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.18",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.11",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.12.5",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2025-02-11T08:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Installer Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.3,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-427",
                     description: "CWE-427: Uncontrolled Search Path Element",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-12T01:42:07.678Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Installer Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21206",
            },
         ],
         title: "Visual Studio Installer Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2025-21206",
      datePublished: "2025-02-11T17:58:07.750Z",
      dateReserved: "2024-12-05T21:43:30.768Z",
      dateUpdated: "2025-03-12T01:42:07.678Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-21986
Vulnerability from cvelistv5
Published
2022-02-09 16:36
Modified
2025-01-02 18:28
Summary
.NET Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:00:54.541Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET Denial of Service Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21986",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.9.17",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.10",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.6",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Visual Studio 2019 for Mac version 8.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.10.18",
                     status: "affected",
                     version: "8.1.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 5.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "5.0.14",
                     status: "affected",
                     version: "5.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.2",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.9.17",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.10",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.6",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:macos:*:*",
                           versionEndExcluding: "8.10.18",
                           versionStartIncluding: "8.1.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "5.0.14",
                           versionStartIncluding: "5.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.2",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2022-02-08T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-02T18:28:16.455Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21986",
            },
         ],
         title: ".NET Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2022-21986",
      datePublished: "2022-02-09T16:36:32",
      dateReserved: "2021-12-16T00:00:00",
      dateUpdated: "2025-01-02T18:28:16.455Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-28263
Vulnerability from cvelistv5
Published
2023-04-11 19:13
Modified
2025-01-23 01:05
Summary
Visual Studio Information Disclosure Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-28263",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-12T15:43:42.993245Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-12T15:43:49.201Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T12:30:24.687Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Information Disclosure Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28263",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.15",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.26",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.21",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.7",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.5.4",
                     status: "affected",
                     version: "17.5.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.15",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.26",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.21",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.7",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.5.4",
                           versionStartIncluding: "17.5.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-04-11T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Information Disclosure Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-170",
                     description: "CWE-170: Improper Null Termination",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-23T01:05:18.837Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Information Disclosure Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28263",
            },
         ],
         title: "Visual Studio Information Disclosure Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-28263",
      datePublished: "2023-04-11T19:13:57.714Z",
      dateReserved: "2023-03-13T22:18:32.393Z",
      dateUpdated: "2025-01-23T01:05:18.837Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-33128
Vulnerability from cvelistv5
Published
2023-06-13 23:26
Modified
2025-01-01 01:44
Summary
.NET and Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-33128",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-08T14:18:33.333686Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-08T14:18:51.143Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T15:39:35.239Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET and Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33128",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.18",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.7",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.22",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.16",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.8",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.3",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.3.5",
                     status: "affected",
                     version: "7.3.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.18",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.7",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.22",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.16",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.8",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.3",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.3.5",
                           versionStartIncluding: "7.3.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-06-13T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.3,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-416",
                     description: "CWE-416: Use After Free",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T01:44:12.674Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33128",
            },
         ],
         title: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-33128",
      datePublished: "2023-06-13T23:26:22.949Z",
      dateReserved: "2023-05-17T21:16:44.895Z",
      dateUpdated: "2025-01-01T01:44:12.674Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-33139
Vulnerability from cvelistv5
Published
2023-06-13 23:25
Modified
2025-01-01 01:43
Summary
Visual Studio Information Disclosure Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T15:39:35.318Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Information Disclosure Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33139",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-33139",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-02T16:39:22.157046Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-02T16:39:30.480Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.55",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.16",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.27",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.22",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.8",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2013 Update 5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "12.0.40702.0",
                     status: "affected",
                     version: "12.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2015 Update 3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "14.0.27554.0",
                     status: "affected",
                     version: "14.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.3",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.55",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.16",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.27",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.22",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.8",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update_5:*:*:*:*:*:*",
                           versionEndExcluding: "12.0.40702.0",
                           versionStartIncluding: "12.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update3:*:*:*:*:*:*",
                           versionEndExcluding: "14.0.27554.0",
                           versionStartIncluding: "14.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.3",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-06-13T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Information Disclosure Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-125",
                     description: "CWE-125: Out-of-bounds Read",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T01:43:39.771Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Information Disclosure Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33139",
            },
         ],
         title: "Visual Studio Information Disclosure Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-33139",
      datePublished: "2023-06-13T23:25:55.404Z",
      dateReserved: "2023-05-17T21:16:44.896Z",
      dateUpdated: "2025-01-01T01:43:39.771Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-44487
Vulnerability from cvelistv5
Published
2023-10-10 00:00
Modified
2025-03-07 18:15
Summary
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
References
https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73
https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/
https://aws.amazon.com/security/security-bulletins/AWS-2023-011/
https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack
https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/
https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/
https://news.ycombinator.com/item?id=37831062
https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/
https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack
https://github.com/envoyproxy/envoy/pull/30055
https://github.com/haproxy/haproxy/issues/2312
https://github.com/eclipse/jetty.project/issues/10679
https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764
https://github.com/nghttp2/nghttp2/pull/1961
https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61
https://github.com/alibaba/tengine/issues/1872
https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2
https://news.ycombinator.com/item?id=37830987
https://news.ycombinator.com/item?id=37830998
https://github.com/caddyserver/caddy/issues/5877
https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/
https://github.com/bcdannyboy/CVE-2023-44487
https://github.com/grpc/grpc-go/pull/6703
https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244
https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0
https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html
https://my.f5.com/manage/s/article/K000137106
https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/
https://bugzilla.proxmox.com/show_bug.cgi?id=4988
https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9
http://www.openwall.com/lists/oss-security/2023/10/10/7mailing-list
http://www.openwall.com/lists/oss-security/2023/10/10/6mailing-list
https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected
https://github.com/microsoft/CBL-Mariner/pull/6381
https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo
https://github.com/facebook/proxygen/pull/466
https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088
https://github.com/micrictor/http2-rst-stream
https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve
https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/
https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf
https://github.com/h2o/h2o/pull/3291
https://github.com/nodejs/node/pull/50121
https://github.com/dotnet/announcements/issues/277
https://github.com/golang/go/issues/63417
https://github.com/advisories/GHSA-vx74-f528-fxqg
https://github.com/apache/trafficserver/pull/10564
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487
https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14
https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q
https://www.openwall.com/lists/oss-security/2023/10/10/6
https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487
https://github.com/opensearch-project/data-prepper/issues/3474
https://github.com/kubernetes/kubernetes/pull/121120
https://github.com/oqtane/oqtane.framework/discussions/3367
https://github.com/advisories/GHSA-xpw8-rcwv-8f8p
https://netty.io/news/2023/10/10/4-1-100-Final.html
https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487
https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/
https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack
https://news.ycombinator.com/item?id=37837043
https://github.com/kazu-yamamoto/http2/issues/93
https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html
https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1
https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113
https://www.debian.org/security/2023/dsa-5522vendor-advisory
https://www.debian.org/security/2023/dsa-5521vendor-advisory
https://access.redhat.com/security/cve/cve-2023-44487
https://github.com/ninenines/cowboy/issues/1615
https://github.com/varnishcache/varnish-cache/issues/3996
https://github.com/tempesta-tech/tempesta/issues/1986
https://blog.vespa.ai/cve-2023-44487/
https://github.com/etcd-io/etcd/issues/16740
https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event
https://istio.io/latest/news/security/istio-security-2023-004/
https://github.com/junkurihara/rust-rpxy/issues/97
https://bugzilla.suse.com/show_bug.cgi?id=1216123
https://bugzilla.redhat.com/show_bug.cgi?id=2242803
https://ubuntu.com/security/CVE-2023-44487
https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125
https://github.com/advisories/GHSA-qppj-fm5r-hxr3
https://github.com/apache/httpd-site/pull/10
https://github.com/projectcontour/contour/pull/5826
https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632
https://github.com/line/armeria/pull/5232
https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/
https://security.paloaltonetworks.com/CVE-2023-44487
https://github.com/akka/akka-http/issues/4323
https://github.com/openresty/openresty/issues/930
https://github.com/apache/apisix/issues/10320
https://github.com/Azure/AKS/issues/3947
https://github.com/Kong/kong/discussions/11741
https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487
https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/
https://github.com/caddyserver/caddy/releases/tag/v2.7.5
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.htmlmailing-list
http://www.openwall.com/lists/oss-security/2023/10/13/4mailing-list
http://www.openwall.com/lists/oss-security/2023/10/13/9mailing-list
https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/
https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/vendor-advisory
https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/
https://lists.debian.org/debian-lts-announce/2023/10/msg00023.htmlmailing-list
https://security.netapp.com/advisory/ntap-20231016-0001/
https://lists.debian.org/debian-lts-announce/2023/10/msg00024.htmlmailing-list
http://www.openwall.com/lists/oss-security/2023/10/18/4mailing-list
http://www.openwall.com/lists/oss-security/2023/10/18/8mailing-list
http://www.openwall.com/lists/oss-security/2023/10/19/6mailing-list
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/vendor-advisory
http://www.openwall.com/lists/oss-security/2023/10/20/8mailing-list
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/vendor-advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00045.htmlmailing-list
https://www.debian.org/security/2023/dsa-5540vendor-advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00047.htmlmailing-list
https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/vendor-advisory
https://lists.debian.org/debian-lts-announce/2023/11/msg00001.htmlmailing-list
https://www.debian.org/security/2023/dsa-5549vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/vendor-advisory
https://www.debian.org/security/2023/dsa-5558vendor-advisory
https://lists.debian.org/debian-lts-announce/2023/11/msg00012.htmlmailing-list
https://security.gentoo.org/glsa/202311-09vendor-advisory
https://www.debian.org/security/2023/dsa-5570vendor-advisory
https://security.netapp.com/advisory/ntap-20240426-0007/
https://security.netapp.com/advisory/ntap-20240621-0006/
https://security.netapp.com/advisory/ntap-20240621-0007/
https://github.com/grpc/grpc/releases/tag/v1.59.2
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "http",
                  vendor: "ietf",
                  versions: [
                     {
                        status: "affected",
                        version: "2.0",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 7.5,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "NONE",
                     integrityImpact: "NONE",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-44487",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-23T20:34:21.334116Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2023-10-10",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-44487",
                     },
                     type: "kev",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-400",
                        description: "CWE-400 Uncontrolled Resource Consumption",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-23T20:35:03.253Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-19T07:48:04.546Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://aws.amazon.com/security/security-bulletins/AWS-2023-011/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://news.ycombinator.com/item?id=37831062",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/envoyproxy/envoy/pull/30055",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/haproxy/haproxy/issues/2312",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/eclipse/jetty.project/issues/10679",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/nghttp2/nghttp2/pull/1961",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/alibaba/tengine/issues/1872",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://news.ycombinator.com/item?id=37830987",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://news.ycombinator.com/item?id=37830998",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/caddyserver/caddy/issues/5877",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/bcdannyboy/CVE-2023-44487",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/grpc/grpc-go/pull/6703",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://my.f5.com/manage/s/article/K000137106",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://bugzilla.proxmox.com/show_bug.cgi?id=4988",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/microsoft/CBL-Mariner/pull/6381",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/proxygen/pull/466",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/micrictor/http2-rst-stream",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/h2o/h2o/pull/3291",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/nodejs/node/pull/50121",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/dotnet/announcements/issues/277",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/golang/go/issues/63417",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/advisories/GHSA-vx74-f528-fxqg",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/apache/trafficserver/pull/10564",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.openwall.com/lists/oss-security/2023/10/10/6",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/opensearch-project/data-prepper/issues/3474",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/kubernetes/kubernetes/pull/121120",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/oqtane/oqtane.framework/discussions/3367",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/advisories/GHSA-xpw8-rcwv-8f8p",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://netty.io/news/2023/10/10/4-1-100-Final.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://news.ycombinator.com/item?id=37837043",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/kazu-yamamoto/http2/issues/93",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113",
               },
               {
                  name: "DSA-5522",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5522",
               },
               {
                  name: "DSA-5521",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5521",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/security/cve/cve-2023-44487",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/ninenines/cowboy/issues/1615",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/varnishcache/varnish-cache/issues/3996",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/tempesta-tech/tempesta/issues/1986",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://blog.vespa.ai/cve-2023-44487/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/etcd-io/etcd/issues/16740",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://istio.io/latest/news/security/istio-security-2023-004/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/junkurihara/rust-rpxy/issues/97",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://bugzilla.suse.com/show_bug.cgi?id=1216123",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2242803",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://ubuntu.com/security/CVE-2023-44487",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/advisories/GHSA-qppj-fm5r-hxr3",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/apache/httpd-site/pull/10",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/projectcontour/contour/pull/5826",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/line/armeria/pull/5232",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.paloaltonetworks.com/CVE-2023-44487",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/akka/akka-http/issues/4323",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/openresty/openresty/issues/930",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/apache/apisix/issues/10320",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/Azure/AKS/issues/3947",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/Kong/kong/discussions/11741",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/caddyserver/caddy/releases/tag/v2.7.5",
               },
               {
                  name: "[debian-lts-announce] 20231013 [SECURITY] [DLA 3617-1] tomcat9 security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html",
               },
               {
                  name: "[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/10/13/4",
               },
               {
                  name: "[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/10/13/9",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html",
               },
               {
                  name: "FEDORA-2023-ed2642fd58",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/",
               },
               {
                  name: "[debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20231016-0001/",
               },
               {
                  name: "[debian-lts-announce] 20231016 [SECURITY] [DLA 3617-2] tomcat9 regression update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html",
               },
               {
                  name: "[oss-security] 20231018 Vulnerability in Jenkins",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/10/18/4",
               },
               {
                  name: "[oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/10/18/8",
               },
               {
                  name: "[oss-security] 20231019 CVE-2023-45802: Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/10/19/6",
               },
               {
                  name: "FEDORA-2023-54fadada12",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/",
               },
               {
                  name: "FEDORA-2023-5ff7bf1dd8",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/",
               },
               {
                  name: "[oss-security] 20231020 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/10/20/8",
               },
               {
                  name: "FEDORA-2023-17efd3f2cd",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/",
               },
               {
                  name: "FEDORA-2023-d5030c983c",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/",
               },
               {
                  name: "FEDORA-2023-0259c3f26f",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/",
               },
               {
                  name: "FEDORA-2023-2a9214af5f",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/",
               },
               {
                  name: "FEDORA-2023-e9c04d81c1",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/",
               },
               {
                  name: "FEDORA-2023-f66fc0f62a",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
               },
               {
                  name: "FEDORA-2023-4d2fd884ea",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
               },
               {
                  name: "FEDORA-2023-b2c50535cb",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/",
               },
               {
                  name: "FEDORA-2023-fe53e13b5b",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/",
               },
               {
                  name: "FEDORA-2023-4bf641255e",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/",
               },
               {
                  name: "[debian-lts-announce] 20231030 [SECURITY] [DLA 3641-1] jetty9 security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html",
               },
               {
                  name: "DSA-5540",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5540",
               },
               {
                  name: "[debian-lts-announce] 20231031 [SECURITY] [DLA 3638-1] h2o security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715",
               },
               {
                  name: "FEDORA-2023-1caffb88af",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/",
               },
               {
                  name: "FEDORA-2023-3f70b8d406",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/",
               },
               {
                  name: "FEDORA-2023-7b52921cae",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/",
               },
               {
                  name: "FEDORA-2023-7934802344",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/",
               },
               {
                  name: "FEDORA-2023-dbe64661af",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/",
               },
               {
                  name: "FEDORA-2023-822aab0a5a",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/",
               },
               {
                  name: "[debian-lts-announce] 20231105 [SECURITY] [DLA 3645-1] trafficserver security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html",
               },
               {
                  name: "DSA-5549",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5549",
               },
               {
                  name: "FEDORA-2023-c0c6a91330",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/",
               },
               {
                  name: "FEDORA-2023-492b7be466",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/",
               },
               {
                  name: "DSA-5558",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5558",
               },
               {
                  name: "[debian-lts-announce] 20231119 [SECURITY] [DLA 3656-1] netty security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html",
               },
               {
                  name: "GLSA-202311-09",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202311-09",
               },
               {
                  name: "DSA-5570",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5570",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20240426-0007/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20240621-0006/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20240621-0007/",
               },
               {
                  url: "https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-07T18:15:13.812Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73",
            },
            {
               url: "https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/",
            },
            {
               url: "https://aws.amazon.com/security/security-bulletins/AWS-2023-011/",
            },
            {
               url: "https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack",
            },
            {
               url: "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
            },
            {
               url: "https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/",
            },
            {
               url: "https://news.ycombinator.com/item?id=37831062",
            },
            {
               url: "https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/",
            },
            {
               url: "https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack",
            },
            {
               url: "https://github.com/envoyproxy/envoy/pull/30055",
            },
            {
               url: "https://github.com/haproxy/haproxy/issues/2312",
            },
            {
               url: "https://github.com/eclipse/jetty.project/issues/10679",
            },
            {
               url: "https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764",
            },
            {
               url: "https://github.com/nghttp2/nghttp2/pull/1961",
            },
            {
               url: "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61",
            },
            {
               url: "https://github.com/alibaba/tengine/issues/1872",
            },
            {
               url: "https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2",
            },
            {
               url: "https://news.ycombinator.com/item?id=37830987",
            },
            {
               url: "https://news.ycombinator.com/item?id=37830998",
            },
            {
               url: "https://github.com/caddyserver/caddy/issues/5877",
            },
            {
               url: "https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/",
            },
            {
               url: "https://github.com/bcdannyboy/CVE-2023-44487",
            },
            {
               url: "https://github.com/grpc/grpc-go/pull/6703",
            },
            {
               url: "https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244",
            },
            {
               url: "https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0",
            },
            {
               url: "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html",
            },
            {
               url: "https://my.f5.com/manage/s/article/K000137106",
            },
            {
               url: "https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/",
            },
            {
               url: "https://bugzilla.proxmox.com/show_bug.cgi?id=4988",
            },
            {
               url: "https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9",
            },
            {
               name: "[oss-security] 20231010 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2023/10/10/7",
            },
            {
               name: "[oss-security] 20231010 CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2023/10/10/6",
            },
            {
               url: "https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected",
            },
            {
               url: "https://github.com/microsoft/CBL-Mariner/pull/6381",
            },
            {
               url: "https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo",
            },
            {
               url: "https://github.com/facebook/proxygen/pull/466",
            },
            {
               url: "https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088",
            },
            {
               url: "https://github.com/micrictor/http2-rst-stream",
            },
            {
               url: "https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve",
            },
            {
               url: "https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/",
            },
            {
               url: "https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf",
            },
            {
               url: "https://github.com/h2o/h2o/pull/3291",
            },
            {
               url: "https://github.com/nodejs/node/pull/50121",
            },
            {
               url: "https://github.com/dotnet/announcements/issues/277",
            },
            {
               url: "https://github.com/golang/go/issues/63417",
            },
            {
               url: "https://github.com/advisories/GHSA-vx74-f528-fxqg",
            },
            {
               url: "https://github.com/apache/trafficserver/pull/10564",
            },
            {
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487",
            },
            {
               url: "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14",
            },
            {
               url: "https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q",
            },
            {
               url: "https://www.openwall.com/lists/oss-security/2023/10/10/6",
            },
            {
               url: "https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487",
            },
            {
               url: "https://github.com/opensearch-project/data-prepper/issues/3474",
            },
            {
               url: "https://github.com/kubernetes/kubernetes/pull/121120",
            },
            {
               url: "https://github.com/oqtane/oqtane.framework/discussions/3367",
            },
            {
               url: "https://github.com/advisories/GHSA-xpw8-rcwv-8f8p",
            },
            {
               url: "https://netty.io/news/2023/10/10/4-1-100-Final.html",
            },
            {
               url: "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
            },
            {
               url: "https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/",
            },
            {
               url: "https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack",
            },
            {
               url: "https://news.ycombinator.com/item?id=37837043",
            },
            {
               url: "https://github.com/kazu-yamamoto/http2/issues/93",
            },
            {
               url: "https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html",
            },
            {
               url: "https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1",
            },
            {
               url: "https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113",
            },
            {
               name: "DSA-5522",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2023/dsa-5522",
            },
            {
               name: "DSA-5521",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2023/dsa-5521",
            },
            {
               url: "https://access.redhat.com/security/cve/cve-2023-44487",
            },
            {
               url: "https://github.com/ninenines/cowboy/issues/1615",
            },
            {
               url: "https://github.com/varnishcache/varnish-cache/issues/3996",
            },
            {
               url: "https://github.com/tempesta-tech/tempesta/issues/1986",
            },
            {
               url: "https://blog.vespa.ai/cve-2023-44487/",
            },
            {
               url: "https://github.com/etcd-io/etcd/issues/16740",
            },
            {
               url: "https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event",
            },
            {
               url: "https://istio.io/latest/news/security/istio-security-2023-004/",
            },
            {
               url: "https://github.com/junkurihara/rust-rpxy/issues/97",
            },
            {
               url: "https://bugzilla.suse.com/show_bug.cgi?id=1216123",
            },
            {
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2242803",
            },
            {
               url: "https://ubuntu.com/security/CVE-2023-44487",
            },
            {
               url: "https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125",
            },
            {
               url: "https://github.com/advisories/GHSA-qppj-fm5r-hxr3",
            },
            {
               url: "https://github.com/apache/httpd-site/pull/10",
            },
            {
               url: "https://github.com/projectcontour/contour/pull/5826",
            },
            {
               url: "https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632",
            },
            {
               url: "https://github.com/line/armeria/pull/5232",
            },
            {
               url: "https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/",
            },
            {
               url: "https://security.paloaltonetworks.com/CVE-2023-44487",
            },
            {
               url: "https://github.com/akka/akka-http/issues/4323",
            },
            {
               url: "https://github.com/openresty/openresty/issues/930",
            },
            {
               url: "https://github.com/apache/apisix/issues/10320",
            },
            {
               url: "https://github.com/Azure/AKS/issues/3947",
            },
            {
               url: "https://github.com/Kong/kong/discussions/11741",
            },
            {
               url: "https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487",
            },
            {
               url: "https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/",
            },
            {
               url: "https://github.com/caddyserver/caddy/releases/tag/v2.7.5",
            },
            {
               name: "[debian-lts-announce] 20231013 [SECURITY] [DLA 3617-1] tomcat9 security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html",
            },
            {
               name: "[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2023/10/13/4",
            },
            {
               name: "[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2023/10/13/9",
            },
            {
               url: "https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/",
            },
            {
               url: "https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html",
            },
            {
               name: "FEDORA-2023-ed2642fd58",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/",
            },
            {
               url: "https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/",
            },
            {
               name: "[debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20231016-0001/",
            },
            {
               name: "[debian-lts-announce] 20231016 [SECURITY] [DLA 3617-2] tomcat9 regression update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html",
            },
            {
               name: "[oss-security] 20231018 Vulnerability in Jenkins",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2023/10/18/4",
            },
            {
               name: "[oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2023/10/18/8",
            },
            {
               name: "[oss-security] 20231019 CVE-2023-45802: Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2023/10/19/6",
            },
            {
               name: "FEDORA-2023-54fadada12",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/",
            },
            {
               name: "FEDORA-2023-5ff7bf1dd8",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/",
            },
            {
               name: "[oss-security] 20231020 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2023/10/20/8",
            },
            {
               name: "FEDORA-2023-17efd3f2cd",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/",
            },
            {
               name: "FEDORA-2023-d5030c983c",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/",
            },
            {
               name: "FEDORA-2023-0259c3f26f",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/",
            },
            {
               name: "FEDORA-2023-2a9214af5f",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/",
            },
            {
               name: "FEDORA-2023-e9c04d81c1",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/",
            },
            {
               name: "FEDORA-2023-f66fc0f62a",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
            },
            {
               name: "FEDORA-2023-4d2fd884ea",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
            },
            {
               name: "FEDORA-2023-b2c50535cb",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/",
            },
            {
               name: "FEDORA-2023-fe53e13b5b",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/",
            },
            {
               name: "FEDORA-2023-4bf641255e",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/",
            },
            {
               name: "[debian-lts-announce] 20231030 [SECURITY] [DLA 3641-1] jetty9 security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html",
            },
            {
               name: "DSA-5540",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2023/dsa-5540",
            },
            {
               name: "[debian-lts-announce] 20231031 [SECURITY] [DLA 3638-1] h2o security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html",
            },
            {
               url: "https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715",
            },
            {
               name: "FEDORA-2023-1caffb88af",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/",
            },
            {
               name: "FEDORA-2023-3f70b8d406",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/",
            },
            {
               name: "FEDORA-2023-7b52921cae",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/",
            },
            {
               name: "FEDORA-2023-7934802344",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/",
            },
            {
               name: "FEDORA-2023-dbe64661af",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/",
            },
            {
               name: "FEDORA-2023-822aab0a5a",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/",
            },
            {
               name: "[debian-lts-announce] 20231105 [SECURITY] [DLA 3645-1] trafficserver security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html",
            },
            {
               name: "DSA-5549",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2023/dsa-5549",
            },
            {
               name: "FEDORA-2023-c0c6a91330",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/",
            },
            {
               name: "FEDORA-2023-492b7be466",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/",
            },
            {
               name: "DSA-5558",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2023/dsa-5558",
            },
            {
               name: "[debian-lts-announce] 20231119 [SECURITY] [DLA 3656-1] netty security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html",
            },
            {
               name: "GLSA-202311-09",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://security.gentoo.org/glsa/202311-09",
            },
            {
               name: "DSA-5570",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2023/dsa-5570",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20240426-0007/",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20240621-0006/",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20240621-0007/",
            },
            {
               url: "https://github.com/grpc/grpc/releases/tag/v1.59.2",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2023-44487",
      datePublished: "2023-10-10T00:00:00.000Z",
      dateReserved: "2023-09-29T00:00:00.000Z",
      dateUpdated: "2025-03-07T18:15:13.812Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-35777
Vulnerability from cvelistv5
Published
2022-08-09 19:59
Modified
2025-01-02 19:34
Summary
Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T09:44:21.928Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35777",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.50",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.9.24",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.18",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.13",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2012 Update 5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "11.0.61252.0",
                     status: "affected",
                     version: "11.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2013 Update 5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "12.0.40699.0",
                     status: "affected",
                     version: "12.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2015 Update 3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "14.0.27552.0",
                     status: "affected",
                     version: "14.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.7",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.50",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.9.24",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.18",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.13",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update_5:*:*:*:*:*:*",
                           versionEndExcluding: "11.0.61252.0",
                           versionStartIncluding: "11.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update_5:*:*:*:*:*:*",
                           versionEndExcluding: "12.0.40699.0",
                           versionStartIncluding: "12.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update3:*:*:*:*:*:*",
                           versionEndExcluding: "14.0.27552.0",
                           versionStartIncluding: "14.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.7",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2022-08-09T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Remote Code Execution",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-02T19:34:57.963Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35777",
            },
         ],
         title: "Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2022-35777",
      datePublished: "2022-08-09T19:59:23",
      dateReserved: "2022-07-13T00:00:00",
      dateUpdated: "2025-01-02T19:34:57.963Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-28299
Vulnerability from cvelistv5
Published
2023-04-11 19:13
Modified
2025-01-23 01:05
Summary
Visual Studio Spoofing Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T12:38:23.931Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Spoofing Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28299",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.54",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.15",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.26",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.21",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.7",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.5.4",
                     status: "affected",
                     version: "17.5.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.54",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.15",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.26",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.21",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.7",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.5.4",
                           versionStartIncluding: "17.5.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-04-11T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Spoofing Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Spoofing",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-23T01:05:20.556Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Spoofing Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28299",
            },
         ],
         title: "Visual Studio Spoofing Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-28299",
      datePublished: "2023-04-11T19:13:59.381Z",
      dateReserved: "2023-03-13T22:23:36.189Z",
      dateUpdated: "2025-01-23T01:05:20.556Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36792
Vulnerability from cvelistv5
Published
2023-09-12 16:58
Modified
2025-01-01 02:04
Summary
Visual Studio Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) Version: 15.9.0   < 15.9.57
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.2 Version: 17.2.0   < 17.2.21
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Version: 16.11.0   < 16.11.30
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.13
Create a notification for this product.
   Microsoft .NET 6.0 Version: 6.0.0   < 6.0.24
Create a notification for this product.
   Microsoft .NET 7.0 Version: 7.0.0   < 7.0.13
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.9
Create a notification for this product.
   Microsoft PowerShell 7.2 Version: 7.2.0   < 7.2.12
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.7 Version: 17.7.0   < 17.6.9
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.8 Version: 4.8.0   < 4.8.04667.02
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8 Version: 4.8.0   < 4.8.04667.03
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.7.2 Version: 4.7.0   < 4.7.04063.05
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 Version: 3.0.0.0   < 10.0.14393.6252
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 Version: 4.7.0   < 4.7.04063.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8.1 Version: 4.8.1   < 4.8.09186.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2 Version: 4.7.0   < 4.7.04063.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 and 4.6.2 Version: 4.7.0   < 10.0.10240.20162
Create a notification for this product.
   Microsoft Microsoft .NET Framework 2.0 Service Pack 2 Version: 2.0.0   < 3.0.30729.8957
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.0 Service Pack 2 Version: 3.0.0   < 3.0.30729.8957
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 Version: 3.5.0   < 3.0.30729.8957
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5.1 Version: 3.5.0   < 3.0.30729.8957
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-36792",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-06-28T14:00:38.974579Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-28T14:00:45.881Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:01:09.977Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36792",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.57",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.21",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.30",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.13",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.24",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.13",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.9",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.12",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.7",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.9",
                     status: "affected",
                     version: "17.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2016",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows Server 2012",
               ],
               product: "Microsoft .NET Framework 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.04667.02",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows Server 2019",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows Server 2022",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows Server 2019 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.04667.03",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for ARM64-based Systems",
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows Server 2019",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04063.05",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows Server 2016",
                  "Windows 10 Version 1607 for 32-bit Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.14393.6252",
                     status: "affected",
                     version: "3.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2012 R2",
                  "Windows Server 2012",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04063.01",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 11 Version 22H2 for ARM64-based Systems",
                  "Windows 11 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.09186.01",
                     status: "affected",
                     version: "4.8.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)",
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04063.01",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 for 32-bit Systems",
                  "Windows 10 for x64-based Systems",
               ],
               product: "Microsoft .NET Framework 3.5 and 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.10240.20162",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 2.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8957",
                     status: "affected",
                     version: "2.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 3.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8957",
                     status: "affected",
                     version: "3.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2012",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8957",
                     status: "affected",
                     version: "3.5.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
               ],
               product: "Microsoft .NET Framework 3.5.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8957",
                     status: "affected",
                     version: "3.5.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.57",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.21",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.30",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.13",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.24",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.13",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.9",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.12",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.9",
                           versionStartIncluding: "17.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.04667.02",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.04667.03",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04063.05",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.14393.6252",
                           versionStartIncluding: "3.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04063.01",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.09186.01",
                           versionStartIncluding: "4.8.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04063.01",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.10240.20162",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8957",
                           versionStartIncluding: "2.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8957",
                           versionStartIncluding: "3.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8957",
                           versionStartIncluding: "3.5.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8957",
                           versionStartIncluding: "3.5.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-09-12T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-190",
                     description: "CWE-190: Integer Overflow or Wraparound",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T02:04:33.725Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36792",
            },
         ],
         title: "Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-36792",
      datePublished: "2023-09-12T16:58:40.779Z",
      dateReserved: "2023-06-27T15:11:59.871Z",
      dateUpdated: "2025-01-01T02:04:33.725Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-21392
Vulnerability from cvelistv5
Published
2024-03-12 16:57
Modified
2024-12-31 20:19
Summary
.NET and Visual Studio Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-21392",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-03-12T19:02:46.047938Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-12T18:27:30.599Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:20:40.420Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET and Visual Studio Denial of Service Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21392",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.9",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.9.3",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.3.12",
                     status: "affected",
                     version: "7.3.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.4.1",
                     status: "affected",
                     version: "7.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.17",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.3",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.13",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.17",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.8",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.9.3",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.3.12",
                           versionStartIncluding: "7.3.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.4.1",
                           versionStartIncluding: "7.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.17",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.3",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.13",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.17",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.8",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-03-12T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-400",
                     description: "CWE-400: Uncontrolled Resource Consumption",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-31T20:19:06.389Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21392",
            },
         ],
         title: ".NET and Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-21392",
      datePublished: "2024-03-12T16:57:42.012Z",
      dateReserved: "2023-12-08T22:45:20.454Z",
      dateUpdated: "2024-12-31T20:19:06.389Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-28933
Vulnerability from cvelistv5
Published
2024-04-09 17:01
Modified
2025-01-23 01:12
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Version: 16.11.0   < 16.11.35
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.9 Version: 17.0   < 17.9.6
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.18
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.14
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.8 Version: 17.8.0   < 17.8.9
Create a notification for this product.
   Microsoft Microsoft SQL Server 2019 (CU 25) Version: 15.0.0   < 15.0.4360.2
Create a notification for this product.
   Microsoft Microsoft SQL Server 2022 for (CU 12) Version: 16.0.0   < 16.0.4120.1
Create a notification for this product.
   Microsoft Microsoft SQL Server 2019 (GDR) Version: 15.0.0   < 15.0.2110.4
Create a notification for this product.
   Microsoft Microsoft SQL Server 2022 (GDR) Version: 16.0.0   < 16.0.1115.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Windows Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Linux Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on MacOS Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Windows Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Linux Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on MacOS Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-28933",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-22T15:37:19.711302Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T18:03:12.885Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T01:03:51.181Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28933",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.35",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.9",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.9.6",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.18",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.14",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.9",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (CU 25)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.4360.2",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 for (CU 12)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.4120.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.2110.4",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.1115.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.35",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.9.6",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.18",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.14",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.9",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.4360.2",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.4120.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.2110.4",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.1115.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-04-09T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-191",
                     description: "CWE-191: Integer Underflow (Wrap or Wraparound)",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-23T01:12:05.350Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28933",
            },
         ],
         title: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-28933",
      datePublished: "2024-04-09T17:01:13.955Z",
      dateReserved: "2024-03-13T01:26:53.034Z",
      dateUpdated: "2025-01-23T01:12:05.350Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-21566
Vulnerability from cvelistv5
Published
2023-02-14 20:09
Modified
2025-01-01 00:40
Summary
Visual Studio Elevation of Privilege Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-21566",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-03T20:49:49.481846Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-03T20:49:58.715Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:44:01.415Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Elevation of Privilege Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21566",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.13",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.52",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.5",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.19",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.24",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.13",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.52",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.5",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.19",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.24",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-02-14T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-73",
                     description: "CWE-73: External Control of File Name or Path",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T00:40:49.244Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21566",
            },
         ],
         title: "Visual Studio Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-21566",
      datePublished: "2023-02-14T20:09:08.856Z",
      dateReserved: "2022-12-01T14:00:11.204Z",
      dateUpdated: "2025-01-01T00:40:49.244Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-49044
Vulnerability from cvelistv5
Published
2024-11-12 17:53
Modified
2025-01-30 00:09
Summary
Visual Studio Elevation of Privilege Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-49044",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-11-13T04:55:44.267016Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-12-09T17:40:36.462Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.21",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.16",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.9",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.11",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.11.6",
                     status: "affected",
                     version: "17.11",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.21",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.16",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.9",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.11.6",
                           versionStartIncluding: "17.11",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-11-12T08:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-284",
                     description: "CWE-284: Improper Access Control",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-30T00:09:57.627Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49044",
            },
         ],
         title: "Visual Studio Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-49044",
      datePublished: "2024-11-12T17:53:55.992Z",
      dateReserved: "2024-10-11T20:57:49.187Z",
      dateUpdated: "2025-01-30T00:09:57.627Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-41032
Vulnerability from cvelistv5
Published
2022-10-11 00:00
Modified
2025-02-28 20:53
Summary
NuGet Client Elevation of Privilege Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T12:35:47.829Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41032",
               },
               {
                  name: "FEDORA-2022-f9ca76e479",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X7BMHO5ITRBZREVTEKHQRGSFRPDMALV3/",
               },
               {
                  name: "FEDORA-2022-7f5f9ede26",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDPT2MJC3HD7HYZGASOOX6MTDR4ASBL5/",
               },
               {
                  name: "FEDORA-2022-2c37647a9c",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FOG35Z5RL5W5RGLLYLN46CI4D2UPDSWM/",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-41032",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-28T20:23:59.400514Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-269",
                        description: "CWE-269 Improper Privilege Management",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-28T20:53:42.375Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.10",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET Core 3.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.1.30",
                     status: "affected",
                     version: "3.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.9",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.20",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.9.26",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.15",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.3.6",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Visual Studio 2022 for Mac version 17.3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.3.7",
                     status: "affected",
                     version: "17.3",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.10",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.1.30",
                           versionStartIncluding: "3.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.9",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.20",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.9.26",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.15",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.3.6",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:macos:*:*",
                           versionEndExcluding: "17.3.7",
                           versionStartIncluding: "17.3",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2022-10-11T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "NuGet Client Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-02T21:27:14.366Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "NuGet Client Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41032",
            },
         ],
         title: "NuGet Client Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2022-41032",
      datePublished: "2022-10-11T00:00:00.000Z",
      dateReserved: "2022-09-19T00:00:00.000Z",
      dateUpdated: "2025-02-28T20:53:42.375Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-32032
Vulnerability from cvelistv5
Published
2023-06-13 23:26
Modified
2025-01-01 01:44
Summary
.NET and Visual Studio Elevation of Privilege Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-32032",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-22T20:01:37.888322Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-22T20:01:48.177Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T15:03:28.638Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET and Visual Studio Elevation of Privilege Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32032",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.7",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.16",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.22",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.8",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.3",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.3.5",
                     status: "affected",
                     version: "7.3.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.7",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.16",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.22",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.8",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.3",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.3.5",
                           versionStartIncluding: "7.3.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-06-13T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-20",
                     description: "CWE-20: Improper Input Validation",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T01:44:11.443Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32032",
            },
         ],
         title: ".NET and Visual Studio Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-32032",
      datePublished: "2023-06-13T23:26:21.832Z",
      dateReserved: "2023-05-01T15:34:52.133Z",
      dateUpdated: "2025-01-01T01:44:11.443Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-28936
Vulnerability from cvelistv5
Published
2024-04-09 17:00
Modified
2025-01-23 01:11
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft SQL Server 2022 for (CU 12) Version: 16.0.0   < 16.0.4120.1
Create a notification for this product.
   Microsoft Microsoft SQL Server 2019 (CU 25) Version: 15.0.0   < 15.0.4360.2
Create a notification for this product.
   Microsoft Microsoft SQL Server 2019 (GDR) Version: 15.0.0   < 15.0.2110.4
Create a notification for this product.
   Microsoft Microsoft SQL Server 2022 (GDR) Version: 16.0.0   < 16.0.1115.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Windows Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Linux Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on MacOS Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Windows Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Linux Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on MacOS Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Version: 16.11.0   < 16.11.35
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.9 Version: 17.0   < 17.9.6
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.18
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.14
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.8 Version: 17.8.0   < 17.8.9
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-28936",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-01T19:04:55.282290Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T18:03:40.417Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T01:03:51.507Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28936",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 for (CU 12)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.4120.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (CU 25)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.4360.2",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.2110.4",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.1115.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.35",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.9",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.9.6",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.18",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.14",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.9",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.4120.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.4360.2",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.2110.4",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.1115.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.35",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.9.6",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.18",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.14",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.9",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-04-09T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-190",
                     description: "CWE-190: Integer Overflow or Wraparound",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-23T01:11:23.421Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28936",
            },
         ],
         title: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-28936",
      datePublished: "2024-04-09T17:00:28.756Z",
      dateReserved: "2024-03-13T01:26:53.037Z",
      dateUpdated: "2025-01-23T01:11:23.421Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-41119
Vulnerability from cvelistv5
Published
2022-11-09 00:00
Modified
2025-01-02 21:31
Summary
Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T12:35:49.466Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41119",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-41119",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-23T20:17:21.236549Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-08-07T13:57:30.329Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.10",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.51",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.21",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.3.7",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.16",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.10",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.51",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.21",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.3.7",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.16",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2022-11-08T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Remote Code Execution",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-02T21:31:56.482Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41119",
            },
         ],
         title: "Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2022-41119",
      datePublished: "2022-11-09T00:00:00",
      dateReserved: "2022-09-19T00:00:00",
      dateUpdated: "2025-01-02T21:31:56.482Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-0056
Vulnerability from cvelistv5
Published
2024-01-09 17:56
Modified
2024-12-31 18:39
Summary
Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft SQL Server 2022 (GDR) Version: 16.0.0   < 16.0.1110.1
Create a notification for this product.
   Microsoft .NET 6.0 Version: 6.0.0   < 6.0.26
Create a notification for this product.
   Microsoft .NET 7.0 Version: 7.0.0   < 7.0.15
Create a notification for this product.
   Microsoft .NET 8.0 Version: 1.0.0   < 8.0.1
Create a notification for this product.
   Microsoft Microsoft.Data.SqlClient Version: 1.0   < 2.1.7
Create a notification for this product.
   Microsoft System.Data.SqlClient Version: 1.0   < 4.8.6
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.2 Version: 17.2.0   < 17.2.23
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.15
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.11
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.8 Version: 17.8.0   < 17.8.4
Create a notification for this product.
   Microsoft Microsoft SQL Server 2022 (CU 10) Version: 0   < 16.0.4100.1
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.8 Version: 4.8.0   < 4.8.04690.02
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8 Version: 4.8.0   < 4.8.04690.02
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.7.2 Version: 4.7.0   < 4.7.04081.03
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 Version: 4.7.0   < 4.7.04081.02
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8.1 Version: 4.8.1   < 4.8.09214.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 2.0 Service Pack 2 Version: 2.0.0   < 3.0.50727.8976
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T17:41:15.885Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0056",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.1110.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.26",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.15",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.1",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft.Data.SqlClient",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "2.1.7",
                     status: "affected",
                     version: "1.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "System.Data.SqlClient",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.6",
                     status: "affected",
                     version: "1.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.23",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.15",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.11",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.4",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 (CU 10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.4100.1",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2016",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.04690.02",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.04690.02",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows 10 Version 1809 for ARM64-based Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows Server 2016",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04081.03",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2 (Server Core installation)",
                  "Windows Server 2012 R2",
               ],
               product: "Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04081.02",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2022 (Server Core installation)",
                  "Windows Server 2022",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 11 Version 22H2 for ARM64-based Systems",
                  "Windows 11 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
                  "Windows 11 Version 23H2 for ARM64-based Systems",
                  "Windows Server 2022, 23H2 Edition (Server Core installation)",
                  "Windows 11 Version 23H2 for x64-based Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.09214.01",
                     status: "affected",
                     version: "4.8.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 2.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.50727.8976",
                     status: "affected",
                     version: "2.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.1110.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.26",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.15",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.1",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:data_sql_client:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "2.1.7",
                           versionStartIncluding: "1.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:System.Data.SqlClient:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.6",
                           versionStartIncluding: "1.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.23",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.15",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.11",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.4",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.4100.1",
                           versionStartIncluding: "0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.04690.02",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.04690.02",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04081.03",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04081.02",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.09214.01",
                           versionStartIncluding: "4.8.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.50727.8976",
                           versionStartIncluding: "2.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-01-09T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.7,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-319",
                     description: "CWE-319: Cleartext Transmission of Sensitive Information",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-31T18:39:37.324Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0056",
            },
         ],
         title: "Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-0056",
      datePublished: "2024-01-09T17:56:58.972Z",
      dateReserved: "2023-11-22T17:43:06.743Z",
      dateUpdated: "2024-12-31T18:39:37.324Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-43603
Vulnerability from cvelistv5
Published
2024-10-08 17:36
Modified
2025-01-29 23:51
Summary
Visual Studio Collector Service Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-43603",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-08T18:35:39.922024Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-08T19:27:12.025Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.11",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.11.5",
                     status: "affected",
                     version: "17.11",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.67",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.41",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.20",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.15",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.8",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2015 Update 3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "14.0.27561.00",
                     status: "affected",
                     version: "14.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.11.5",
                           versionStartIncluding: "17.11",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.67",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.41",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.20",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.15",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.8",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update3:*:*:*:*:*:*",
                           versionEndExcluding: "14.0.27561.00",
                           versionStartIncluding: "14.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-10-08T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Collector Service Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-59",
                     description: "CWE-59: Improper Link Resolution Before File Access ('Link Following')",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-29T23:51:01.997Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Collector Service Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43603",
            },
         ],
         title: "Visual Studio Collector Service Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-43603",
      datePublished: "2024-10-08T17:36:17.098Z",
      dateReserved: "2024-08-14T01:08:33.551Z",
      dateUpdated: "2025-01-29T23:51:01.997Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-24895
Vulnerability from cvelistv5
Published
2023-06-14 14:52
Modified
2025-01-01 01:43
Summary
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft .NET 7.0 Version: 7.0.0   < 7.0.7
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.0 Version: 17.0.0   < 17.0.22
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.2 Version: 17.2.0   < 17.2.16
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.8
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.3
Create a notification for this product.
   Microsoft PowerShell 7.2 Version: 7.2.0   < 7.2.12
Create a notification for this product.
   Microsoft PowerShell 7.3 Version: 7.3.0   < 7.3.5
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.8 Version: 4.8.0   < 4.8.4644.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8 Version: 4.8.0   < 4.8.4644.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.7.2 Version: 4.7.0   < 4.7.4050.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 Version: 3.0.0.0   < 10.0.14393.5989
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 Version: 4.7.0   < 4.7.04043.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8.1 Version: 4.8.1   < 4.8.9166.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2 Version: 4.7.0   < 4.7.04043.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 and 4.6.2 Version: 4.7.0   < 10.0.10240.19983
Create a notification for this product.
   Microsoft Microsoft .NET Framework 2.0 Service Pack 2 Version: 2.0.0   < 3.0.6920.8954; 2.0.50727.8970
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.0 Service Pack 2 Version: 3.0.0   < 3.0.6920.8954; 2.0.50727.8970
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 Version: 3.5.0   < 3.0.6920.8954; 2.0.50727.8970
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5.1 Version: 3.5.0   < 3.0.6920.8954; 2.0.50727.8970
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-24895",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-12T14:58:02.929435Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-12T14:58:08.964Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T11:11:42.252Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24895",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.7",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.22",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.16",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.8",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.3",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.12",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.3.5",
                     status: "affected",
                     version: "7.3.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2016",
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2012 R2 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows Server 2012 R2",
               ],
               product: "Microsoft .NET Framework 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.4644.0",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows Server 2019",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows Server 2022",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.4644.0",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows 10 Version 1809 for ARM64-based Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.4050.0",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016",
                  "Windows Server 2016 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.14393.5989",
                     status: "affected",
                     version: "3.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 R2 (Server Core installation)",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2",
               ],
               product: "Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04043.0",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 11 Version 22H2 for ARM64-based Systems",
                  "Windows 11 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.9166.0",
                     status: "affected",
                     version: "4.8.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)",
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04043.0",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 for 32-bit Systems",
                  "Windows 10 for x64-based Systems",
               ],
               product: "Microsoft .NET Framework 3.5 and 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.10240.19983",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 2.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.6920.8954; 2.0.50727.8970",
                     status: "affected",
                     version: "2.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 3.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.6920.8954; 2.0.50727.8970",
                     status: "affected",
                     version: "3.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2012",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.6920.8954; 2.0.50727.8970",
                     status: "affected",
                     version: "3.5.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.6920.8954; 2.0.50727.8970",
                     status: "affected",
                     version: "3.5.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.7",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.22",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.16",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.8",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.3",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.12",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.3.5",
                           versionStartIncluding: "7.3.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.4644.0",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.4644.0",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.4050.0",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.14393.5989",
                           versionStartIncluding: "3.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04043.0",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.9166.0",
                           versionStartIncluding: "4.8.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04043.0",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.10240.19983",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.6920.8954; 2.0.50727.8970",
                           versionStartIncluding: "2.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.6920.8954; 2.0.50727.8970",
                           versionStartIncluding: "3.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.6920.8954; 2.0.50727.8970",
                           versionStartIncluding: "3.5.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.6920.8954; 2.0.50727.8970",
                           versionStartIncluding: "3.5.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-06-13T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Remote Code Execution",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T01:43:32.903Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24895",
            },
         ],
         title: ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-24895",
      datePublished: "2023-06-14T14:52:18.749Z",
      dateReserved: "2023-01-31T20:32:35.471Z",
      dateUpdated: "2025-01-01T01:43:32.903Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36759
Vulnerability from cvelistv5
Published
2023-09-12 16:58
Modified
2025-01-01 02:04
Summary
Visual Studio Elevation of Privilege Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:01:09.258Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Elevation of Privilege Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.19",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.30",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.11",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.7",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.7.4",
                     status: "affected",
                     version: "17.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.7",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.19",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.30",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.11",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.7.4",
                           versionStartIncluding: "17.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.7",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-09-12T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-822",
                     description: "CWE-822: Untrusted Pointer Dereference",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T02:04:21.736Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759",
            },
         ],
         title: "Visual Studio Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-36759",
      datePublished: "2023-09-12T16:58:29.748Z",
      dateReserved: "2023-06-27T15:11:59.867Z",
      dateUpdated: "2025-01-01T02:04:21.736Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-24464
Vulnerability from cvelistv5
Published
2022-03-09 17:07
Modified
2025-01-02 18:35
Summary
.NET and Visual Studio Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T04:13:55.503Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET and Visual Studio Denial of Service Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24464",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.3",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 5.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "5.0.15",
                     status: "affected",
                     version: "5.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET Core 3.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.1.23",
                     status: "affected",
                     version: "3.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.7.26",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.9.18",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.11",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.7",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.3",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "5.0.15",
                           versionStartIncluding: "5.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.1.23",
                           versionStartIncluding: "3.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.7.26",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.9.18",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.11",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.7",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2022-03-08T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-02T18:35:20.325Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24464",
            },
         ],
         title: ".NET and Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2022-24464",
      datePublished: "2022-03-09T17:07:46",
      dateReserved: "2022-02-05T00:00:00",
      dateUpdated: "2025-01-02T18:35:20.325Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-29117
Vulnerability from cvelistv5
Published
2022-05-10 20:34
Modified
2025-01-02 18:58
Summary
.NET and Visual Studio Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T06:10:59.422Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29117",
               },
               {
                  name: "FEDORA-2022-d69fee9f38",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/",
               },
               {
                  name: "FEDORA-2022-9a1d5ea33c",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/",
               },
               {
                  name: "FEDORA-2022-256d559f0c",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.5",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET Core 3.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.1.25",
                     status: "affected",
                     version: "3.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 5.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "5.0.17",
                     status: "affected",
                     version: "5.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.10",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.9.21",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.1.7",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.14",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.5",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.1.25",
                           versionStartIncluding: "3.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "5.0.17",
                           versionStartIncluding: "5.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.10",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.9.21",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.1.7",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.14",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2022-05-10T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-02T18:58:09.910Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29117",
            },
         ],
         title: ".NET and Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2022-29117",
      datePublished: "2022-05-10T20:34:23",
      dateReserved: "2022-04-12T00:00:00",
      dateUpdated: "2025-01-02T18:58:09.910Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36793
Vulnerability from cvelistv5
Published
2023-09-12 16:58
Modified
2025-01-01 02:04
Summary
Visual Studio Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) Version: 15.9.0   < 15.9.57
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.2 Version: 17.2.0   < 17.2.21
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Version: 16.11.0   < 16.11.30
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.13
Create a notification for this product.
   Microsoft .NET 7.0 Version: 7.0.0   < 7.0.13
Create a notification for this product.
   Microsoft .NET 6.0 Version: 6.0.0   < 6.0.24
Create a notification for this product.
   Microsoft PowerShell 7.2 Version: 7.2.0   < 7.2.12
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.9
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.7 Version: 17.7.0   < 17.6.9
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.8 Version: 4.8.0   < 4.8.04667.02
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8 Version: 4.8.0   < 4.8.04667.03
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 Version: 3.0.0.0   < 10.0.14393.6252
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.7.2 Version: 4.7.0   < 4.7.04063.05
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 Version: 4.7.0   < 4.7.04063.02
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8.1 Version: 4.8.1   < 4.8.09186.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2 Version: 4.7.0   < 4.7.04063.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 and 4.6.2 Version: 4.7.0   < 10.0.10240.20162
Create a notification for this product.
   Microsoft Microsoft .NET Framework 2.0 Service Pack 2 Version: 2.0.0   < 3.0.30729.8957
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.0 Service Pack 2 Version: 3.0.0   < 3.0.30729.8957
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 Version: 3.5.0   < 3.0.30729.8957
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5.1 Version: 3.5.0   < 3.0.30729.8957
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-36793",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-29T15:20:19.558478Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:25:44.719Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:01:09.928Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36793",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.57",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.21",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.30",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.13",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.13",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.24",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.12",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.9",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.7",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.9",
                     status: "affected",
                     version: "17.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows Server 2016",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012 R2 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
               ],
               product: "Microsoft .NET Framework 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.04667.02",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2022",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows Server 2019",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows Server 2019 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.04667.03",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2016",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows 10 Version 1607 for x64-based Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.14393.6252",
                     status: "affected",
                     version: "3.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows 10 Version 1809 for ARM64-based Systems",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows Server 2019",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04063.05",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
               ],
               product: "Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04063.02",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 11 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
                  "Windows 11 Version 22H2 for ARM64-based Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.09186.01",
                     status: "affected",
                     version: "4.8.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)",
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04063.01",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 for 32-bit Systems",
                  "Windows 10 for x64-based Systems",
               ],
               product: "Microsoft .NET Framework 3.5 and 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.10240.20162",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 2.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8957",
                     status: "affected",
                     version: "2.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 3.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8957",
                     status: "affected",
                     version: "3.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2012",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8957",
                     status: "affected",
                     version: "3.5.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8957",
                     status: "affected",
                     version: "3.5.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.57",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.21",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.30",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.13",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.13",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.24",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.12",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.9",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.9",
                           versionStartIncluding: "17.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.04667.02",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.04667.03",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.14393.6252",
                           versionStartIncluding: "3.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04063.05",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04063.02",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.09186.01",
                           versionStartIncluding: "4.8.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04063.01",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.10240.20162",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8957",
                           versionStartIncluding: "2.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8957",
                           versionStartIncluding: "3.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8957",
                           versionStartIncluding: "3.5.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8957",
                           versionStartIncluding: "3.5.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-09-12T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "CWE-122: Heap-based Buffer Overflow",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T02:04:33.186Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36793",
            },
         ],
         title: "Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-36793",
      datePublished: "2023-09-12T16:58:40.256Z",
      dateReserved: "2023-06-27T15:11:59.872Z",
      dateUpdated: "2025-01-01T02:04:33.186Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-35264
Vulnerability from cvelistv5
Published
2024-07-09 17:02
Modified
2025-03-11 16:39
Summary
.NET and Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-35264",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-09T18:13:39.190149Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-10T16:35:29.446Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T03:07:46.880Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET and Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35264",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     status: "affected",
                     version: "N/A",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.7",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.21",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.12",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.4",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.17",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionStartIncluding: "N/A",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.7",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.21",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.12",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.4",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.17",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-07-09T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-416",
                     description: "CWE-416: Use After Free",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-11T16:39:07.870Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35264",
            },
         ],
         title: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-35264",
      datePublished: "2024-07-09T17:02:10.148Z",
      dateReserved: "2024-05-14T20:14:47.413Z",
      dateUpdated: "2025-03-11T16:39:07.870Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-43498
Vulnerability from cvelistv5
Published
2024-11-12 17:53
Modified
2025-01-30 00:10
Summary
.NET and Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-43498",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-11-13T20:11:42.647690Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-11-13T20:11:59.384Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.5.0",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.16",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.21",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.9",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.11",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.11.6",
                     status: "affected",
                     version: "17.11",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 9.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "9.0.0",
                     status: "affected",
                     version: "9.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.5.0",
                           versionStartIncluding: "7.5.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.16",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.21",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.9",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.11.6",
                           versionStartIncluding: "17.11",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "9.0.0",
                           versionStartIncluding: "9.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-11-12T08:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-843",
                     description: "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-30T00:10:03.747Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43498",
            },
         ],
         title: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-43498",
      datePublished: "2024-11-12T17:53:58.782Z",
      dateReserved: "2024-08-14T01:08:33.521Z",
      dateUpdated: "2025-01-30T00:10:03.747Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-38229
Vulnerability from cvelistv5
Published
2024-10-08 17:35
Modified
2025-01-29 23:49
Summary
.NET and Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-38229",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-08T18:55:00.476544Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-08T18:55:12.358Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.20",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.15",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.8",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.10",
                     status: "affected",
                     version: "8.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.11",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.11.5",
                     status: "affected",
                     version: "17.11",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.20",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.15",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.8",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.10",
                           versionStartIncluding: "8.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.11.5",
                           versionStartIncluding: "17.11",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-10-08T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-416",
                     description: "CWE-416: Use After Free",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-29T23:49:58.755Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38229",
            },
         ],
         title: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-38229",
      datePublished: "2024-10-08T17:35:16.768Z",
      dateReserved: "2024-06-11T22:36:08.227Z",
      dateUpdated: "2025-01-29T23:49:58.755Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36796
Vulnerability from cvelistv5
Published
2023-09-12 16:58
Modified
2025-01-01 02:04
Summary
Visual Studio Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.9
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.7 Version: 17.7.0   < 17.7.6
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) Version: 15.9.0   < 15.9.57
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.2 Version: 17.2.0   < 17.2.21
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Version: 16.11.0   < 16.11.30
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.13
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2013 Update 5 Version: 12.0.0   < 12.0.40707.0
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2015 Update 3 Version: 14.0.0   < 14.0.27559.0
Create a notification for this product.
   Microsoft .NET 7.0 Version: 7.0.0   < 7.0.13
Create a notification for this product.
   Microsoft .NET 6.0 Version: 6.0.0   < 6.0.24
Create a notification for this product.
   Microsoft PowerShell 7.2 Version: 7.2.0   < 7.2.12
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8 Version: 4.8.0   < 4.8.04667.03
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.8 Version: 4.8.0   < 4.8.04667.02
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.7.2 Version: 4.7.0   < 4.7.04063.05
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 Version: 3.0.0.0   < 10.0.14393.6252
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 Version: 4.7.0   < 4.7.04063.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8.1 Version: 4.8.1   < 4.8.09186.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2 Version: 4.7.0   < 4.7.04063.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 and 4.6.2 Version: 4.7.0   < 10.0.10240.20162
Create a notification for this product.
   Microsoft Microsoft .NET Framework 2.0 Service Pack 2 Version: 2.0.0   < 3.0.30729.8957
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.0 Service Pack 2 Version: 3.0.0   < 3.0.30729.8957
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 Version: 3.5.0   < 3.0.30729.8957
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5.1 Version: 3.5.0   < 3.0.30729.8957
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-36796",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-29T18:14:53.378773Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:25:47.414Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:01:09.624Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36796",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.9",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.7",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.7.6",
                     status: "affected",
                     version: "17.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.57",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.21",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.30",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.13",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2013 Update 5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "12.0.40707.0",
                     status: "affected",
                     version: "12.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2015 Update 3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "14.0.27559.0",
                     status: "affected",
                     version: "14.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.13",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.24",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.12",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2022",
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.04667.03",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 R2 (Server Core installation)",
                  "Windows Server 2016",
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.04667.02",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows 10 Version 1809 for ARM64-based Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04063.05",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.14393.6252",
                     status: "affected",
                     version: "3.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04063.01",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2022 (Server Core installation)",
                  "Windows Server 2022",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 11 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 11 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.09186.01",
                     status: "affected",
                     version: "4.8.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04063.01",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 for x64-based Systems",
                  "Windows 10 for 32-bit Systems",
               ],
               product: "Microsoft .NET Framework 3.5 and 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.10240.20162",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 2.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8957",
                     status: "affected",
                     version: "2.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 3.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8957",
                     status: "affected",
                     version: "3.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2012",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8957",
                     status: "affected",
                     version: "3.5.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
               ],
               product: "Microsoft .NET Framework 3.5.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8957",
                     status: "affected",
                     version: "3.5.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.9",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.7.6",
                           versionStartIncluding: "17.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.57",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.21",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.30",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.13",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update_5:*:*:*:*:*:*",
                           versionEndExcluding: "12.0.40707.0",
                           versionStartIncluding: "12.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update3:*:*:*:*:*:*",
                           versionEndExcluding: "14.0.27559.0",
                           versionStartIncluding: "14.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.13",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.24",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.12",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.04667.03",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.04667.02",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04063.05",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.14393.6252",
                           versionStartIncluding: "3.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04063.01",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.09186.01",
                           versionStartIncluding: "4.8.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04063.01",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.10240.20162",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8957",
                           versionStartIncluding: "2.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8957",
                           versionStartIncluding: "3.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8957",
                           versionStartIncluding: "3.5.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8957",
                           versionStartIncluding: "3.5.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-09-12T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-191",
                     description: "CWE-191: Integer Underflow (Wrap or Wraparound)",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T02:04:32.188Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36796",
            },
         ],
         title: "Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-36796",
      datePublished: "2023-09-12T16:58:39.186Z",
      dateReserved: "2023-06-27T15:11:59.873Z",
      dateUpdated: "2025-01-01T02:04:32.188Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-24513
Vulnerability from cvelistv5
Published
2022-04-15 19:03
Modified
2025-01-02 18:51
Summary
Visual Studio Elevation of Privilege Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T04:13:56.028Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Elevation of Privilege Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24513",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.49",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.7.27",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.9.23",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Visual Studio 2019 for Mac version 8.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.10.24",
                     status: "affected",
                     version: "8.1.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.16",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.12",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.1.7",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Visual Studio 2022 for Mac version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.3",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.49",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.7.27",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.9.23",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:macos:*:*",
                           versionEndExcluding: "8.10.24",
                           versionStartIncluding: "8.1.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.16",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.12",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.1.7",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.3",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2022-04-12T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-02T18:51:46.747Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24513",
            },
         ],
         title: "Visual Studio Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2022-24513",
      datePublished: "2022-04-15T19:03:40",
      dateReserved: "2022-02-05T00:00:00",
      dateUpdated: "2025-01-02T18:51:46.747Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-33170
Vulnerability from cvelistv5
Published
2023-07-11 17:03
Modified
2025-01-01 01:52
Summary
ASP.NET and Visual Studio Security Feature Bypass Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T15:39:35.661Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "ASP.NET and Visual Studio Security Feature Bypass Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVZVMMCCBBCSCPAW2CRQGOTKIHVFCMRO/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TLWNIIA2I6YCYVCXYBPBRSZ3UH6KILTG/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3VJRGNYJXGPF5LXUG3NL45QPK2UU6PL/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5CFOR6ID2HP45E7ZOGQNX76FPIWP7XR/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.17",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.23",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.9",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.5",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.20",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.9",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.17",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.23",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.9",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.5",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.20",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.9",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-07-11T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "ASP.NET and Visual Studio Security Feature Bypass Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-362",
                     description: "CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T01:52:48.640Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "ASP.NET and Visual Studio Security Feature Bypass Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170",
            },
         ],
         title: "ASP.NET and Visual Studio Security Feature Bypass Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-33170",
      datePublished: "2023-07-11T17:03:13.113Z",
      dateReserved: "2023-05-17T21:16:44.903Z",
      dateUpdated: "2025-01-01T01:52:48.640Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-28935
Vulnerability from cvelistv5
Published
2024-04-09 17:01
Modified
2025-01-23 01:12
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft SQL Server 2019 (CU 25) Version: 15.0.0   < 15.0.4360.2
Create a notification for this product.
   Microsoft Microsoft SQL Server 2022 for (CU 12) Version: 16.0.0   < 16.0.4120.1
Create a notification for this product.
   Microsoft Microsoft SQL Server 2019 (GDR) Version: 15.0.0   < 15.0.2110.4
Create a notification for this product.
   Microsoft Microsoft SQL Server 2022 (GDR) Version: 16.0.0   < 16.0.1115.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Windows Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Linux Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on MacOS Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Windows Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Linux Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on MacOS Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Version: 16.11.0   < 16.11.35
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.9 Version: 17.0   < 17.9.6
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.18
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.14
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.8 Version: 17.8.0   < 17.8.9
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-28935",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-12T12:55:55.302963Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T18:03:37.151Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T01:03:51.452Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28935",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (CU 25)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.4360.2",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 for (CU 12)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.4120.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.2110.4",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.1115.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.35",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.9",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.9.6",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.18",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.14",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.9",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.4360.2",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.4120.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.2110.4",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.1115.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.35",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.9.6",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.18",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.14",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.9",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-04-09T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "CWE-122: Heap-based Buffer Overflow",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-23T01:12:06.415Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28935",
            },
         ],
         title: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-28935",
      datePublished: "2024-04-09T17:01:15.096Z",
      dateReserved: "2024-03-13T01:26:53.036Z",
      dateUpdated: "2025-01-23T01:12:06.415Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2025-21405
Vulnerability from cvelistv5
Published
2025-01-14 18:04
Modified
2025-04-02 13:23
Summary
Visual Studio Elevation of Privilege Vulnerability
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2025-21405",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-15T21:22:33.912217Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-15T21:54:00.823Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.12",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.12.4",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.12.4",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2025-01-14T08:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.3,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-284",
                     description: "CWE-284: Improper Access Control",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-04-02T13:23:51.033Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21405",
            },
         ],
         title: "Visual Studio Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2025-21405",
      datePublished: "2025-01-14T18:04:14.562Z",
      dateReserved: "2024-12-11T00:29:48.375Z",
      dateUpdated: "2025-04-02T13:23:51.033Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2025-21172
Vulnerability from cvelistv5
Published
2025-01-14 18:04
Modified
2025-04-02 13:24
Summary
.NET and Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2025-21172",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-27T00:00:00+00:00",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-28T04:55:36.041Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.69",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.43",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.22",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.17",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.10",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2015 Update 3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "14.0.24252.2",
                     status: "affected",
                     version: "14.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.12",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.12.4",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.12",
                     status: "affected",
                     version: "8.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 9.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "9.0.1",
                     status: "affected",
                     version: "9.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.69",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.43",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.22",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.17",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.10",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update3:*:*:*:*:*:*",
                           versionEndExcluding: "14.0.24252.2",
                           versionStartIncluding: "14.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.12.4",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.12",
                           versionStartIncluding: "8.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "9.0.1",
                           versionStartIncluding: "9.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2025-01-14T08:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-190",
                     description: "CWE-190: Integer Overflow or Wraparound",
                     lang: "en-US",
                     type: "CWE",
                  },
                  {
                     cweId: "CWE-122",
                     description: "CWE-122: Heap-based Buffer Overflow",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-04-02T13:24:17.774Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21172",
            },
         ],
         title: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2025-21172",
      datePublished: "2025-01-14T18:04:38.469Z",
      dateReserved: "2024-12-05T21:43:30.760Z",
      dateUpdated: "2025-04-02T13:24:17.774Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-43483
Vulnerability from cvelistv5
Published
2024-10-08 17:35
Modified
2025-01-29 23:50
Summary
.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
Impacted products
Vendor Product Version
Microsoft PowerShell 7.2 Version: 7.2.0   < 7.2.24
Create a notification for this product.
   Microsoft PowerShell 7.4 Version: 7.4.0   < 7.4.6
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.20
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.8 Version: 17.8.0   < 17.8.15
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.10 Version: 17.10   < 17.10.8
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.11 Version: 17.11   < 17.11.5
Create a notification for this product.
   Microsoft .NET 8.0 Version: 8.0.0   < 8.0.10
Create a notification for this product.
   Microsoft .NET 6.0 Version: 6.0.0   < 6.0.35
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.8 Version: 4.8.0   < 4.8.04762.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8 Version: 4.8.0   < 4.8.04762.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.7.2 Version: 4.7.0   < 4.7.04115.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 Version: 4.7.0   < 4.7.04115.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8.1 Version: 4.8.1   < 4.8.1.9277.03
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2 Version: 4.7.0   < 4.7.04115.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6/4.6.2 Version: 10.0.0.0   < 10.0.10240.20796
Create a notification for this product.
   Microsoft Microsoft .NET Framework 2.0 Service Pack 2 Version: 2.0.0   < 3.0.30729.8974
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.0 Service Pack 2 Version: 3.0.0   < 3.0.30729.8974
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 Version: 3.5.0   < 3.5.30729.8973
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5.1 Version: 3.5.0   < 3.5.1.30729.8974
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-43483",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-08T18:54:49.591134Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-09T19:48:38.422Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.24",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.4.6",
                     status: "affected",
                     version: "7.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.20",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.15",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.8",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.11",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.11.5",
                     status: "affected",
                     version: "17.11",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.10",
                     status: "affected",
                     version: "8.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.35",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.04762.01",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.04762.01",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04115.01",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04115.01",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 11 Version 22H2 for ARM64-based Systems",
                  "Windows 11 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
                  "Windows 11 Version 23H2 for ARM64-based Systems",
                  "Windows 11 Version 23H2 for x64-based Systems",
                  "Windows Server 2022, 23H2 Edition (Server Core installation)",
                  "Windows 11 Version 24H2 for ARM64-based Systems",
                  "Windows 11 Version 24H2 for x64-based Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.1.9277.03",
                     status: "affected",
                     version: "4.8.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04115.01",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 for 32-bit Systems",
                  "Windows 10 for x64-based Systems",
               ],
               product: "Microsoft .NET Framework 4.6/4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.10240.20796",
                     status: "affected",
                     version: "10.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 2.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8974",
                     status: "affected",
                     version: "2.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 3.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8974",
                     status: "affected",
                     version: "3.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
                  "Windows Server 2012",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.5.30729.8973",
                     status: "affected",
                     version: "3.5.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.5.1.30729.8974",
                     status: "affected",
                     version: "3.5.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.24",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.4.6",
                           versionStartIncluding: "7.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.20",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.15",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.8",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.11.5",
                           versionStartIncluding: "17.11",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.10",
                           versionStartIncluding: "8.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.35",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.04762.01",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.04762.01",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04115.01",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04115.01",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.1.9277.03",
                           versionStartIncluding: "4.8.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04115.01",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.10240.20796",
                           versionStartIncluding: "10.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8974",
                           versionStartIncluding: "2.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8974",
                           versionStartIncluding: "3.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.5.30729.8973",
                           versionStartIncluding: "3.5.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.5.1.30729.8974",
                           versionStartIncluding: "3.5.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-10-08T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-407",
                     description: "CWE-407: Inefficient Algorithmic Complexity",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-29T23:50:32.813Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43483",
            },
         ],
         title: ".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-43483",
      datePublished: "2024-10-08T17:35:46.198Z",
      dateReserved: "2024-08-14T01:08:33.518Z",
      dateUpdated: "2025-01-29T23:50:32.813Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-28938
Vulnerability from cvelistv5
Published
2024-04-09 17:01
Modified
2025-01-23 01:12
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft SQL Server 2022 for (CU 12) Version: 16.0.0   < 16.0.4120.1
Create a notification for this product.
   Microsoft Microsoft SQL Server 2019 (CU 25) Version: 15.0.0   < 15.0.4360.2
Create a notification for this product.
   Microsoft Microsoft SQL Server 2019 (GDR) Version: 15.0.0   < 15.0.2110.4
Create a notification for this product.
   Microsoft Microsoft SQL Server 2022 (GDR) Version: 16.0.0   < 16.0.1115.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Windows Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Linux Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on MacOS Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Windows Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Linux Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on MacOS Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Version: 16.11.0   < 16.11.35
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.9 Version: 17.0   < 17.9.6
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.18
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.14
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.8 Version: 17.8.0   < 17.8.9
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-28938",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-10T17:30:59.430193Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T18:03:20.638Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T01:03:51.355Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28938",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 for (CU 12)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.4120.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (CU 25)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.4360.2",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.2110.4",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.1115.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.35",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.9",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.9.6",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.18",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.14",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.9",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.4120.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.4360.2",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.2110.4",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.1115.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.35",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.9.6",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.18",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.14",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.9",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-04-09T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-125",
                     description: "CWE-125: Out-of-bounds Read",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-23T01:12:07.412Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28938",
            },
         ],
         title: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-28938",
      datePublished: "2024-04-09T17:01:16.170Z",
      dateReserved: "2024-03-13T01:26:53.037Z",
      dateUpdated: "2025-01-23T01:12:07.412Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-23267
Vulnerability from cvelistv5
Published
2022-05-10 20:33
Modified
2025-01-02 18:57
Summary
.NET and Visual Studio Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:36:20.350Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23267",
               },
               {
                  name: "FEDORA-2022-d69fee9f38",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/",
               },
               {
                  name: "FEDORA-2022-9a1d5ea33c",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/",
               },
               {
                  name: "FEDORA-2022-256d559f0c",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET Core 3.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.1.25",
                     status: "affected",
                     version: "3.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 5.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "5.0.17",
                     status: "affected",
                     version: "5.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.9.21",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Visual Studio 2019 for Mac version 8.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.10.24",
                     status: "affected",
                     version: "8.1.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.14",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.10",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.5",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.1.7",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.11",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.4",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Visual Studio 2022 for Mac version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.3",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.1.25",
                           versionStartIncluding: "3.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "5.0.17",
                           versionStartIncluding: "5.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.9.21",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:macos:*:*",
                           versionEndExcluding: "8.10.24",
                           versionStartIncluding: "8.1.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.14",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.10",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.5",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.1.7",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.11",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.4",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.3",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2022-05-10T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-02T18:57:48.914Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23267",
            },
         ],
         title: ".NET and Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2022-23267",
      datePublished: "2022-05-10T20:33:32",
      dateReserved: "2022-01-15T00:00:00",
      dateUpdated: "2025-01-02T18:57:48.914Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-43590
Vulnerability from cvelistv5
Published
2024-10-08 17:36
Modified
2025-01-29 23:50
Summary
Visual C++ Redistributable Installer Elevation of Privilege Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-43590",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-08T18:34:14.182011Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-08T18:34:32.825Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Visual C++ Redistributable Installer",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "14.40.33816",
                     status: "affected",
                     version: "10.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.67",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.41",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.20",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.15",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.8",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.11",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.11.5",
                     status: "affected",
                     version: "17.11",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_c_plus_plus_redistributable_installer:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "14.40.33816",
                           versionStartIncluding: "10.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.67",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.41",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.20",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.15",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.8",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.11.5",
                           versionStartIncluding: "17.11",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-10-08T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual C++ Redistributable Installer Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-284",
                     description: "CWE-284: Improper Access Control",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-29T23:50:59.023Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual C++ Redistributable Installer Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43590",
            },
         ],
         title: "Visual C++ Redistributable Installer Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-43590",
      datePublished: "2024-10-08T17:36:14.169Z",
      dateReserved: "2024-08-14T01:08:33.548Z",
      dateUpdated: "2025-01-29T23:50:59.023Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-21404
Vulnerability from cvelistv5
Published
2024-02-13 18:02
Modified
2024-12-31 18:51
Summary
.NET Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-21404",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-06-28T14:17:08.064098Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-28T14:17:14.300Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:20:40.452Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET Denial of Service Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21404",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.27",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.16",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.2",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.16",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.12",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.7",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.27",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.16",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.2",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.16",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.12",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.7",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-02-13T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-476",
                     description: "CWE-476: NULL Pointer Dereference",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-31T18:51:49.401Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21404",
            },
         ],
         title: ".NET Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-21404",
      datePublished: "2024-02-13T18:02:24.234Z",
      dateReserved: "2023-12-08T22:45:21.298Z",
      dateUpdated: "2024-12-31T18:51:49.401Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-30045
Vulnerability from cvelistv5
Published
2024-05-14 16:57
Modified
2024-12-31 19:04
Summary
.NET and Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-30045",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-15T17:32:06.325446Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:39:36.245Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-11-22T12:04:49.715Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET and Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045",
               },
               {
                  url: "https://security.netapp.com/advisory/ntap-20241122-0001/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.5",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.19",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.9",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.9.7",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.19",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.15",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.10",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.4.3",
                     status: "affected",
                     version: "7.4.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.5",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.19",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.9.7",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.19",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.15",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.10",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.4.3",
                           versionStartIncluding: "7.4.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-05-14T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 6.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "CWE-122: Heap-based Buffer Overflow",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-31T19:04:32.174Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045",
            },
         ],
         title: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-30045",
      datePublished: "2024-05-14T16:57:29.676Z",
      dateReserved: "2024-03-22T23:12:13.408Z",
      dateUpdated: "2024-12-31T19:04:32.174Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-30105
Vulnerability from cvelistv5
Published
2024-07-09 17:02
Modified
2025-03-11 16:39
Summary
.NET and Visual Studio Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-30105",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-10T15:05:16.271423Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-10T15:05:25.429Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T01:25:03.130Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET Core and Visual Studio Denial of Service Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30105",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.7",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.4.4",
                     status: "affected",
                     version: "7.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.21",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.17",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.4",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.12",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.7",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.4.4",
                           versionStartIncluding: "7.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.21",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.17",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.4",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.12",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-07-09T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-400",
                     description: "CWE-400: Uncontrolled Resource Consumption",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-11T16:39:41.429Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30105",
            },
         ],
         title: ".NET and Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-30105",
      datePublished: "2024-07-09T17:02:41.777Z",
      dateReserved: "2024-03-22T23:12:15.573Z",
      dateUpdated: "2025-03-11T16:39:41.429Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36799
Vulnerability from cvelistv5
Published
2023-09-12 16:58
Modified
2025-01-01 02:04
Summary
.NET Core and Visual Studio Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-36799",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-29T16:23:47.132893Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:25:46.976Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:01:09.676Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET Core and Visual Studio Denial of Service Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36799",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.24",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.13",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.21",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.13",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.7",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.9",
                     status: "affected",
                     version: "17.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.9",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.14",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.14",
                     status: "affected",
                     version: "7.3.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.24",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.13",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.21",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.13",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.9",
                           versionStartIncluding: "17.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.9",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.14",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.14",
                           versionStartIncluding: "7.3.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-09-12T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET Core and Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-400",
                     description: "CWE-400: Uncontrolled Resource Consumption",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T02:04:31.722Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET Core and Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36799",
            },
         ],
         title: ".NET Core and Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-36799",
      datePublished: "2023-09-12T16:58:38.681Z",
      dateReserved: "2023-06-27T15:11:59.874Z",
      dateUpdated: "2025-01-01T02:04:31.722Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-35827
Vulnerability from cvelistv5
Published
2022-08-09 20:12
Modified
2025-01-02 19:34
Summary
Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T09:44:22.086Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35827",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-35827",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-21T19:23:43.503677Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-21T19:25:36.725Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.7",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.13",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.50",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2015 Update 3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "14.0.27552.0",
                     status: "affected",
                     version: "14.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.18",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.9.24",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2013 Update 5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "12.0.40699.0",
                     status: "affected",
                     version: "12.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2012 Update 5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "11.0.61252.0",
                     status: "affected",
                     version: "11.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.7",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.13",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.50",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update3:*:*:*:*:*:*",
                           versionEndExcluding: "14.0.27552.0",
                           versionStartIncluding: "14.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.18",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.9.24",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update_5:*:*:*:*:*:*",
                           versionEndExcluding: "12.0.40699.0",
                           versionStartIncluding: "12.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update_5:*:*:*:*:*:*",
                           versionEndExcluding: "11.0.61252.0",
                           versionStartIncluding: "11.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2022-08-09T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Remote Code Execution",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-02T19:34:57.317Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35827",
            },
         ],
         title: "Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2022-35827",
      datePublished: "2022-08-09T20:12:50",
      dateReserved: "2022-07-13T00:00:00",
      dateUpdated: "2025-01-02T19:34:57.317Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36794
Vulnerability from cvelistv5
Published
2023-09-12 16:58
Modified
2025-01-01 02:04
Summary
Visual Studio Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) Version: 15.9.0   < 15.9.57
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.2 Version: 17.2.0   < 17.2.21
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Version: 16.11.0   < 16.11.30
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.13
Create a notification for this product.
   Microsoft PowerShell 7.2 Version: 7.2.0   < 7.2.12
Create a notification for this product.
   Microsoft .NET 6.0 Version: 6.0.0   < 6.0.24
Create a notification for this product.
   Microsoft .NET 7.0 Version: 7.0.0   < 7.0.13
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.9
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.7 Version: 17.7.0   < 17.6.9
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.8 Version: 4.8.0   < 4.8.04667.02
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8 Version: 4.8.0   < 4.8.04667.02
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.7.2 Version: 4.7.0   < 4.7.04063.05
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 Version: 3.0.0.0   < 10.0.14393.6252
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 Version: 4.7.0   < 4.7.04063.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8.1 Version: 4.8.1   < 4.8.09186.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2 Version: 4.7.0   < 4.7.04063.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 and 4.6.2 Version: 4.7.0   < 10.0.10240.20162
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.0 Service Pack 2 Version: 3.0.0   < 3.0.30729.8957
Create a notification for this product.
   Microsoft Microsoft .NET Framework 2.0 Service Pack 2 Version: 2.0.0   < 3.0.30729.8957
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 Version: 3.5.0   < 3.0.30729.8957
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5.1 Version: 3.5.0   < 3.0.30729.8957
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-36794",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-06-14T15:55:22.038287Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-14T15:55:32.545Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:01:09.543Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36794",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.57",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.21",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.30",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.13",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.12",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.24",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.13",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.9",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.7",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.9",
                     status: "affected",
                     version: "17.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2016 (Server Core installation)",
                  "Windows Server 2016",
                  "Windows Server 2012 R2 (Server Core installation)",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 R2",
               ],
               product: "Microsoft .NET Framework 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.04667.02",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows Server 2019",
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.04667.02",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows 10 Version 1809 for ARM64-based Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04063.05",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows Server 2016",
                  "Windows Server 2016 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.14393.6252",
                     status: "affected",
                     version: "3.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04063.01",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 11 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 11 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.09186.01",
                     status: "affected",
                     version: "4.8.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)",
                  "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04063.01",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 for x64-based Systems",
                  "Windows 10 for 32-bit Systems",
               ],
               product: "Microsoft .NET Framework 3.5 and 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.10240.20162",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 3.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8957",
                     status: "affected",
                     version: "3.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 2.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8957",
                     status: "affected",
                     version: "2.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2012",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8957",
                     status: "affected",
                     version: "3.5.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.30729.8957",
                     status: "affected",
                     version: "3.5.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.57",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.21",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.30",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.13",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.12",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.24",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.13",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.9",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.9",
                           versionStartIncluding: "17.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.04667.02",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.04667.02",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04063.05",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.14393.6252",
                           versionStartIncluding: "3.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04063.01",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.09186.01",
                           versionStartIncluding: "4.8.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04063.01",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.10240.20162",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8957",
                           versionStartIncluding: "3.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8957",
                           versionStartIncluding: "2.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8957",
                           versionStartIncluding: "3.5.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.30729.8957",
                           versionStartIncluding: "3.5.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-09-12T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-191",
                     description: "CWE-191: Integer Underflow (Wrap or Wraparound)",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T02:04:32.641Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36794",
            },
         ],
         title: "Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-36794",
      datePublished: "2023-09-12T16:58:39.719Z",
      dateReserved: "2023-06-27T15:11:59.873Z",
      dateUpdated: "2025-01-01T02:04:32.641Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-24512
Vulnerability from cvelistv5
Published
2022-03-09 17:08
Modified
2025-01-02 18:35
Summary
.NET and Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T04:13:56.019Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET and Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24512",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.7.26",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.9.18",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.11",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.7",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 5.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "5.0.15",
                     status: "affected",
                     version: "5.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.3",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET Core 3.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.1.23",
                     status: "affected",
                     version: "3.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.2",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.9",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.1.6",
                     status: "affected",
                     version: "7.1.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.7.26",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.9.18",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.11",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.7",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "5.0.15",
                           versionStartIncluding: "5.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.3",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.1.23",
                           versionStartIncluding: "3.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.2",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.9",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.1.6",
                           versionStartIncluding: "7.1.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2022-03-08T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 6.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Remote Code Execution",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-02T18:35:12.932Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24512",
            },
         ],
         title: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2022-24512",
      datePublished: "2022-03-09T17:08:15",
      dateReserved: "2022-02-05T00:00:00",
      dateUpdated: "2025-01-02T18:35:12.932Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-28260
Vulnerability from cvelistv5
Published
2023-04-11 19:13
Modified
2025-01-23 01:05
Summary
.NET DLL Hijacking Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T12:30:24.683Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET DLL Hijacking Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28260",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.16",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.5",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.5.4",
                     status: "affected",
                     version: "17.5.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.7",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.15",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.21",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.3.4",
                     status: "affected",
                     version: "7.3.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.11",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.16",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.5",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.5.4",
                           versionStartIncluding: "17.5.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.7",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.15",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.21",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.3.4",
                           versionStartIncluding: "7.3.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.11",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-04-11T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET DLL Hijacking Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Remote Code Execution",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-23T01:05:17.536Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET DLL Hijacking Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28260",
            },
         ],
         title: ".NET DLL Hijacking Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-28260",
      datePublished: "2023-04-11T19:13:56.662Z",
      dateReserved: "2023-03-13T22:18:32.391Z",
      dateUpdated: "2025-01-23T01:05:17.536Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-38167
Vulnerability from cvelistv5
Published
2024-08-13 17:29
Modified
2025-04-15 23:44
Summary
.NET and Visual Studio Information Disclosure Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-38167",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-14T14:59:50.642718Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-08-14T15:00:19.345Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.13",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.8",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.18",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.13",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.8",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.18",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-08-13T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Information Disclosure Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-319",
                     description: "CWE-319: Cleartext Transmission of Sensitive Information",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-04-15T23:44:27.772Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Information Disclosure Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38167",
            },
         ],
         title: ".NET and Visual Studio Information Disclosure Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-38167",
      datePublished: "2024-08-13T17:29:48.525Z",
      dateReserved: "2024-06-11T22:36:08.212Z",
      dateUpdated: "2025-04-15T23:44:27.772Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-38081
Vulnerability from cvelistv5
Published
2024-07-09 17:03
Modified
2025-03-11 16:40
Summary
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.21
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.17
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.8 Version: 17.8.0   < 17.8.12
Create a notification for this product.
   Microsoft .NET 6.0 Version: 6.0.0   < 6.0.32
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 Version: 4.7.0   < 4.7.4101.02
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8.1 Version: 4.8.1   < 4.8.1.9256.03
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2 Version: 4.7.0   < 4.7.4101.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6/4.6.2 Version: 10.0.0.0   < 10.0.10240.20710
Create a notification for this product.
   Microsoft Microsoft .NET Framework 2.0 Service Pack 2 Version: 2.0.0   < 2.0.50727.8977
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.0 Service Pack 2 Version: 3.0.0   < 2.0.50727.8977
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 Version: 3.5.0   < 3.5.30729.8972
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5.1 Version: 3.5.0   < 3.5.30729.8971
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.8 Version: 4.8.0   < 4.8.04739.02
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8 Version: 4.8.0   < 4.8.4739.04
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.7.2 Version: 4.7.0   < 4.7.2.4101.03
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-38081",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-09T18:00:51.956378Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-09T18:00:59.015Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T04:04:25.011Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38081",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.21",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.17",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.12",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.32",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 R2",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.4101.02",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 11 Version 22H2 for ARM64-based Systems",
                  "Windows 11 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
                  "Windows 11 Version 23H2 for ARM64-based Systems",
                  "Windows Server 2022, 23H2 Edition (Server Core installation)",
                  "Windows 11 Version 23H2 for x64-based Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.1.9256.03",
                     status: "affected",
                     version: "4.8.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)",
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.4101.01",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 for 32-bit Systems",
                  "Windows 10 for x64-based Systems",
               ],
               product: "Microsoft .NET Framework 4.6/4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.10240.20710",
                     status: "affected",
                     version: "10.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 2.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "2.0.50727.8977",
                     status: "affected",
                     version: "2.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 3.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "2.0.50727.8977",
                     status: "affected",
                     version: "3.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
                  "Windows Server 2012",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.5.30729.8972",
                     status: "affected",
                     version: "3.5.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.5.30729.8971",
                     status: "affected",
                     version: "3.5.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows Server 2016",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.04739.02",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows Server 2022",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.4739.04",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows 10 Version 1809 for ARM64-based Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016",
                  "Windows Server 2016 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.2.4101.03",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.21",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.17",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.12",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.32",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.4101.02",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.1.9256.03",
                           versionStartIncluding: "4.8.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.4101.01",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.10240.20710",
                           versionStartIncluding: "10.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "2.0.50727.8977",
                           versionStartIncluding: "2.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "2.0.50727.8977",
                           versionStartIncluding: "3.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.5.30729.8972",
                           versionStartIncluding: "3.5.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.5.30729.8971",
                           versionStartIncluding: "3.5.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.04739.02",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.4739.04",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.2.4101.03",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-07-09T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.3,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-59",
                     description: "CWE-59: Improper Link Resolution Before File Access ('Link Following')",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-11T16:40:22.736Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38081",
            },
         ],
         title: ".NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-38081",
      datePublished: "2024-07-09T17:03:22.527Z",
      dateReserved: "2024-06-11T22:36:08.182Z",
      dateUpdated: "2025-03-11T16:40:22.736Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-29060
Vulnerability from cvelistv5
Published
2024-06-11 16:59
Modified
2024-12-31 19:37
Summary
Visual Studio Elevation of Privilege Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-29060",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-06-11T18:59:22.420493Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-11T18:59:37.398Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T01:03:51.658Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Elevation of Privilege Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29060",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.2",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.63",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.37",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.20",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.16",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.11",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.2",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.63",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.37",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.20",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.16",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.11",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-06-11T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-284",
                     description: "CWE-284: Improper Access Control",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-31T19:37:44.081Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29060",
            },
         ],
         title: "Visual Studio Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-29060",
      datePublished: "2024-06-11T16:59:48.371Z",
      dateReserved: "2024-03-14T23:05:27.954Z",
      dateUpdated: "2024-12-31T19:37:44.081Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-21567
Vulnerability from cvelistv5
Published
2023-02-14 20:09
Modified
2025-01-01 00:40
Summary
Visual Studio Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-21567",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-29T15:38:10.306172Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:19:47.290Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:44:01.094Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Denial of Service Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21567",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.13",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.19",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.24",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.52",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.5",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.13",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.19",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.24",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.52",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.5",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-02-14T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 5.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-59",
                     description: "CWE-59: Improper Link Resolution Before File Access ('Link Following')",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T00:40:49.777Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21567",
            },
         ],
         title: "Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-21567",
      datePublished: "2023-02-14T20:09:09.644Z",
      dateReserved: "2022-12-01T14:00:11.204Z",
      dateUpdated: "2025-01-01T00:40:49.777Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36049
Vulnerability from cvelistv5
Published
2023-11-14 20:18
Modified
2025-01-01 02:16
Summary
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft Visual Studio 2022 version 17.2 Version: 17.2.0   < 17.2.22
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.14
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.7 Version: 17.7.0   < 17.7.7
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.10
Create a notification for this product.
   Microsoft .NET 8.0 Version: 1.0.0   < 8.0.0
Create a notification for this product.
   Microsoft .NET 6.0 Version: 6.0.0   < 6.0.25
Create a notification for this product.
   Microsoft .NET 7.0 Version: 7.0.0   < 7.0.14
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8.1 Version: 4.8.1   < 4.8.9206.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.8 Version: 4.8.0   < 4.8.4682.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8 Version: 4.8.0   < 4.8.4682.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.7.2 Version: 4.7.0   < 4.7.4076.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 Version: 3.0.0.0   < 10.0.14393.6452
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 Version: 4.7.0   < 4.7.4076.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2 Version: 4.7.0   < 4.7.4076.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.6/4.6.2 Version: 10.0.0   < 10.0.10240.20308
Create a notification for this product.
   Microsoft Microsoft .NET Framework 2.0 Service Pack 2 Version: 2.0.0   < 3.0.50727.8975
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.0 Service Pack 2 Version: 3.0.0   < 3.0.50727.8975
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 Version: 3.5.0   < 3.0.50727.8975
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5.1 Version: 3.5.0   < 3.0.50727.8975
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T16:37:41.336Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36049",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.22",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.14",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.7",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.7.7",
                     status: "affected",
                     version: "17.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.10",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.0",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.25",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.14",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 11 Version 23H2 for x64-based Systems",
                  "Windows Server 2022, 23H2 Edition (Server Core installation)",
                  "Windows 11 Version 23H2 for ARM64-based Systems",
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 11 Version 22H2 for ARM64-based Systems",
                  "Windows 11 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.9206.0",
                     status: "affected",
                     version: "4.8.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.4682.0",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.4682.0",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows 10 Version 1809 for ARM64-based Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.4076.0",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016",
                  "Windows Server 2016 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.14393.6452",
                     status: "affected",
                     version: "3.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.4076.0",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.4076.0",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 for 32-bit Systems",
                  "Windows 10 for x64-based Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.6/4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.10240.20308",
                     status: "affected",
                     version: "10.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 2.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.50727.8975",
                     status: "affected",
                     version: "2.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 3.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.50727.8975",
                     status: "affected",
                     version: "3.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2012",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.50727.8975",
                     status: "affected",
                     version: "3.5.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.50727.8975",
                     status: "affected",
                     version: "3.5.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.22",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.14",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.7.7",
                           versionStartIncluding: "17.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.10",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.0",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.25",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.14",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.9206.0",
                           versionStartIncluding: "4.8.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.4682.0",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.4682.0",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.4076.0",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.14393.6452",
                           versionStartIncluding: "3.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.4076.0",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.4076.0",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.10240.20308",
                           versionStartIncluding: "10.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.50727.8975",
                           versionStartIncluding: "2.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.50727.8975",
                           versionStartIncluding: "3.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.50727.8975",
                           versionStartIncluding: "3.5.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.50727.8975",
                           versionStartIncluding: "3.5.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-11-14T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.6,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-20",
                     description: "CWE-20: Improper Input Validation",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T02:16:09.425Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36049",
            },
         ],
         title: ".NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-36049",
      datePublished: "2023-11-14T20:18:04.925Z",
      dateReserved: "2023-06-20T20:44:39.829Z",
      dateUpdated: "2025-01-01T02:16:09.425Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-33126
Vulnerability from cvelistv5
Published
2023-06-13 23:26
Modified
2025-01-01 01:44
Summary
.NET and Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-33126",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-08T14:17:17.554630Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-08T14:17:47.264Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T15:39:35.835Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET and Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33126",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.18",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.7",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.16",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.22",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.8",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.3",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.12",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.18",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.7",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.16",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.22",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.8",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.3",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.12",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-06-13T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.3,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Remote Code Execution",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T01:44:12.050Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33126",
            },
         ],
         title: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-33126",
      datePublished: "2023-06-13T23:26:22.404Z",
      dateReserved: "2023-05-17T21:16:44.895Z",
      dateUpdated: "2025-01-01T01:44:12.050Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-38168
Vulnerability from cvelistv5
Published
2024-08-13 17:29
Modified
2025-04-15 23:44
Summary
.NET and Visual Studio Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-38168",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-15T14:23:57.648145Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-08-15T14:24:10.618Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.8",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.18",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.13",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.8",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.18",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.13",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-08-13T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-400",
                     description: "CWE-400: Uncontrolled Resource Consumption",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-04-15T23:44:28.395Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38168",
            },
         ],
         title: ".NET and Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-38168",
      datePublished: "2024-08-13T17:29:49.113Z",
      dateReserved: "2024-06-11T22:36:08.212Z",
      dateUpdated: "2025-04-15T23:44:28.395Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-8927
Vulnerability from cvelistv5
Published
2020-09-15 09:15
Modified
2024-08-04 10:12
Summary
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
References
https://github.com/google/brotli/releases/tag/v1.0.9x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.htmlvendor-advisory, x_refsource_SUSE
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP/vendor-advisory, x_refsource_FEDORA
https://usn.ubuntu.com/4568-1/vendor-advisory, x_refsource_UBUNTU
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK/vendor-advisory, x_refsource_FEDORA
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6/vendor-advisory, x_refsource_FEDORA
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6/vendor-advisory, x_refsource_FEDORA
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I/vendor-advisory, x_refsource_FEDORA
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH/vendor-advisory, x_refsource_FEDORA
https://lists.debian.org/debian-lts-announce/2020/12/msg00003.htmlmailing-list, x_refsource_MLIST
https://www.debian.org/security/2020/dsa-4801vendor-advisory, x_refsource_DEBIAN
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/vendor-advisory, x_refsource_FEDORA
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/vendor-advisory, x_refsource_FEDORA
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/vendor-advisory, x_refsource_FEDORA
Impacted products
Vendor Product Version
Google LLC Brotli Version: stable   <
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:12:11.066Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/google/brotli/releases/tag/v1.0.9",
               },
               {
                  name: "openSUSE-SU-2020:1578",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.html",
               },
               {
                  name: "FEDORA-2020-22d278923a",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP/",
               },
               {
                  name: "USN-4568-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4568-1/",
               },
               {
                  name: "FEDORA-2020-c663fbc46c",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK/",
               },
               {
                  name: "FEDORA-2020-e21bd401ad",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6/",
               },
               {
                  name: "FEDORA-2020-bc9a739f0c",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6/",
               },
               {
                  name: "FEDORA-2020-9336b65f82",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I/",
               },
               {
                  name: "FEDORA-2020-c76a35b209",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH/",
               },
               {
                  name: "[debian-lts-announce] 20201201 [SECURITY] [DLA 2476-1] brotli security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2020/12/msg00003.html",
               },
               {
                  name: "DSA-4801",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2020/dsa-4801",
               },
               {
                  name: "FEDORA-2022-9e046f579a",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/",
               },
               {
                  name: "FEDORA-2022-5ecee47acb",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/",
               },
               {
                  name: "FEDORA-2022-d28042f559",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Brotli",
               vendor: "Google LLC",
               versions: [
                  {
                     lessThanOrEqual: "1.0.7",
                     status: "affected",
                     version: "stable",
                     versionType: "custom",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "Jay Lv <nengzhi.pnz@antgroup.com>",
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a \"one-shot\" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the \"streaming\" API as opposed to the \"one-shot\" API, and impose chunk size limits.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-130",
                     description: "CWE-130 Improper Handling of Length Parameter Inconsistency ",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-03-27T04:06:10",
            orgId: "14ed7db2-1595-443d-9d34-6215bf890778",
            shortName: "Google",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/google/brotli/releases/tag/v1.0.9",
            },
            {
               name: "openSUSE-SU-2020:1578",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.html",
            },
            {
               name: "FEDORA-2020-22d278923a",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP/",
            },
            {
               name: "USN-4568-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4568-1/",
            },
            {
               name: "FEDORA-2020-c663fbc46c",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK/",
            },
            {
               name: "FEDORA-2020-e21bd401ad",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6/",
            },
            {
               name: "FEDORA-2020-bc9a739f0c",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6/",
            },
            {
               name: "FEDORA-2020-9336b65f82",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I/",
            },
            {
               name: "FEDORA-2020-c76a35b209",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH/",
            },
            {
               name: "[debian-lts-announce] 20201201 [SECURITY] [DLA 2476-1] brotli security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2020/12/msg00003.html",
            },
            {
               name: "DSA-4801",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2020/dsa-4801",
            },
            {
               name: "FEDORA-2022-9e046f579a",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/",
            },
            {
               name: "FEDORA-2022-5ecee47acb",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/",
            },
            {
               name: "FEDORA-2022-d28042f559",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Buffer overflow in Brotli library",
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@google.com",
               ID: "CVE-2020-8927",
               STATE: "PUBLIC",
               TITLE: "Buffer overflow in Brotli library",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Brotli",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_name: "stable",
                                          version_value: "1.0.7",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Google LLC",
                     },
                  ],
               },
            },
            credit: [
               {
                  lang: "eng",
                  value: "Jay Lv <nengzhi.pnz@antgroup.com>",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a \"one-shot\" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the \"streaming\" API as opposed to the \"one-shot\" API, and impose chunk size limits.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-130 Improper Handling of Length Parameter Inconsistency ",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://github.com/google/brotli/releases/tag/v1.0.9",
                     refsource: "CONFIRM",
                     url: "https://github.com/google/brotli/releases/tag/v1.0.9",
                  },
                  {
                     name: "openSUSE-SU-2020:1578",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.html",
                  },
                  {
                     name: "FEDORA-2020-22d278923a",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP/",
                  },
                  {
                     name: "USN-4568-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4568-1/",
                  },
                  {
                     name: "FEDORA-2020-c663fbc46c",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK/",
                  },
                  {
                     name: "FEDORA-2020-e21bd401ad",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6/",
                  },
                  {
                     name: "FEDORA-2020-bc9a739f0c",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6/",
                  },
                  {
                     name: "FEDORA-2020-9336b65f82",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I/",
                  },
                  {
                     name: "FEDORA-2020-c76a35b209",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH/",
                  },
                  {
                     name: "[debian-lts-announce] 20201201 [SECURITY] [DLA 2476-1] brotli security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2020/12/msg00003.html",
                  },
                  {
                     name: "DSA-4801",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2020/dsa-4801",
                  },
                  {
                     name: "FEDORA-2022-9e046f579a",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/",
                  },
                  {
                     name: "FEDORA-2022-5ecee47acb",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/",
                  },
                  {
                     name: "FEDORA-2022-d28042f559",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/",
                  },
               ],
            },
            source: {
               discovery: "EXTERNAL",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "14ed7db2-1595-443d-9d34-6215bf890778",
      assignerShortName: "Google",
      cveId: "CVE-2020-8927",
      datePublished: "2020-09-15T09:15:12",
      dateReserved: "2020-02-12T00:00:00",
      dateUpdated: "2024-08-04T10:12:11.066Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-38013
Vulnerability from cvelistv5
Published
2022-09-13 00:00
Modified
2025-03-11 16:10
Summary
.NET Core and Visual Studio Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T10:37:42.606Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38013",
               },
               {
                  name: "FEDORA-2022-980d492c98",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7HCV4TQGOTOFHO5ETRKGFKAGYV2YAUVE/",
               },
               {
                  name: "FEDORA-2022-847c67b3cd",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WL334CKOHA6BQQSYJW365HIWJ4IOE45M/",
               },
               {
                  name: "FEDORA-2022-d80b1d2827",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JA6F4CDKLI3MALV6UK3P2DR5AGCLTT7Y/",
               },
               {
                  name: "FEDORA-2022-34a610d9bf",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4K5YL7USOKIR3O2DUKBZMYPWXYPDKXG/",
               },
               {
                  name: "FEDORA-2022-13046bb867",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2CUL3Z7MEED7RFQZVGQL2MTKSFFZKAAY/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Visual Studio 2022 for Mac version 17.3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.3.5",
                     status: "affected",
                     version: "17.3",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.3.4",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET Core 3.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.1.29",
                     status: "affected",
                     version: "3.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.9",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.19",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.9.25",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.14",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.8",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:macos:*:*",
                           versionEndExcluding: "17.3.5",
                           versionStartIncluding: "17.3",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.3.4",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.1.29",
                           versionStartIncluding: "3.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.9",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.19",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.9.25",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.14",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.8",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2022-09-13T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET Core and Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-11T16:10:17.149Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET Core and Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38013",
            },
         ],
         title: ".NET Core and Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2022-38013",
      datePublished: "2022-09-13T00:00:00",
      dateReserved: "2022-08-08T00:00:00",
      dateUpdated: "2025-03-11T16:10:17.149Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-28929
Vulnerability from cvelistv5
Published
2024-04-09 17:00
Modified
2025-01-23 01:11
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft SQL Server 2019 (CU 25) Version: 15.0.0   < 15.0.4360.2
Create a notification for this product.
   Microsoft Microsoft SQL Server 2022 for (CU 12) Version: 16.0.0   < 16.0.4120.1
Create a notification for this product.
   Microsoft Microsoft SQL Server 2019 (GDR) Version: 15.0.0   < 15.0.2110.4
Create a notification for this product.
   Microsoft Microsoft SQL Server 2022 (GDR) Version: 16.0.0   < 16.0.1115.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Windows Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Linux Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on MacOS Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Windows Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Linux Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on MacOS Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Version: 16.11.0   < 16.11.35
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.9 Version: 17.0   < 17.9.6
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.18
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.14
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.8 Version: 17.8.0   < 17.8.9
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-28929",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-22T16:11:54.498743Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-29T20:29:04.530Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T01:03:51.116Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28929",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (CU 25)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.4360.2",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 for (CU 12)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.4120.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.2110.4",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.1115.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.35",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.9",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.9.6",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.18",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.14",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.9",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.4360.2",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.4120.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.2110.4",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.1115.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.35",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.9.6",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.18",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.14",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.9",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-04-09T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-190",
                     description: "CWE-190: Integer Overflow or Wraparound",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-23T01:11:21.949Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28929",
            },
         ],
         title: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-28929",
      datePublished: "2024-04-09T17:00:27.042Z",
      dateReserved: "2024-03-13T01:26:53.031Z",
      dateUpdated: "2025-01-23T01:11:21.949Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-21409
Vulnerability from cvelistv5
Published
2024-04-09 17:00
Modified
2025-01-23 01:11
Summary
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft Visual Studio 2022 version 17.9 Version: 17.0   < 17.9.6
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.18
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.14
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.8 Version: 17.8.0   < 17.8.9
Create a notification for this product.
   Microsoft PowerShell 7.3 Version: 7.3.0   < 7.3.12
Create a notification for this product.
   Microsoft PowerShell 7.4 Version: 7.4.0   < 7.4.2
Create a notification for this product.
   Microsoft PowerShell 7.2 Version: 7.2.0   < 7.2.19
Create a notification for this product.
   Microsoft .NET 6.0 Version: 6.0.0   < 6.0.29
Create a notification for this product.
   Microsoft .NET 7.0 Version: 7.0.0   < 7.0.18
Create a notification for this product.
   Microsoft .NET 8.0 Version: 1.0.0   < 8.0.4
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.8 Version: 4.8.0   < 4.8.4718.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8 Version: 4.8.0   < 4.8.4718.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.7.2 Version: 4.7.0   < 4.7.4092.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 Version: 4.7.0   < 4.7.4092.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8.1 Version: 4.8.1   < 4.8.9236.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2 Version: 4.7.0   < 4.7.4092.0
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-21409",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-25T00:14:54.668309Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:37:59.942Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2025-01-17T20:02:52.767Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21409",
               },
               {
                  url: "https://security.netapp.com/advisory/ntap-20250117-0002/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.9",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.9.6",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.18",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.14",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.9",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.3.12",
                     status: "affected",
                     version: "7.3.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.4.2",
                     status: "affected",
                     version: "7.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.19",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.29",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.18",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.4",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.4718.0",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016",
                  "Windows Server 2016 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.4718.0",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows 10 Version 1809 for ARM64-based Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016",
                  "Windows Server 2016 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.4092.0",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.4092.0",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 11 Version 22H2 for ARM64-based Systems",
                  "Windows 11 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
                  "Windows 11 Version 23H2 for ARM64-based Systems",
                  "Windows 11 Version 23H2 for x64-based Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.9236.0",
                     status: "affected",
                     version: "4.8.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.4092.0",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.9.6",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.18",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.14",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.9",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.3.12",
                           versionStartIncluding: "7.3.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.4.2",
                           versionStartIncluding: "7.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.19",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.29",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.18",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.4",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.4718.0",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.4718.0",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.4092.0",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.4092.0",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.9236.0",
                           versionStartIncluding: "4.8.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.4092.0",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-04-09T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.3,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-416",
                     description: "CWE-416: Use After Free",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-23T01:11:02.847Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21409",
            },
         ],
         title: ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-21409",
      datePublished: "2024-04-09T17:00:08.248Z",
      dateReserved: "2023-12-08T22:45:21.299Z",
      dateUpdated: "2025-01-23T01:11:02.847Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-29145
Vulnerability from cvelistv5
Published
2022-05-10 20:34
Modified
2025-01-02 18:58
Summary
.NET and Visual Studio Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T06:10:59.448Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29145",
               },
               {
                  name: "FEDORA-2022-d69fee9f38",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/",
               },
               {
                  name: "FEDORA-2022-9a1d5ea33c",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/",
               },
               {
                  name: "FEDORA-2022-256d559f0c",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.5",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET Core 3.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.1.25",
                     status: "affected",
                     version: "3.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 5.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "5.0.17",
                     status: "affected",
                     version: "5.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.1.7",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.9.21",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.10",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.14",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.5",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "3.1.25",
                           versionStartIncluding: "3.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "5.0.17",
                           versionStartIncluding: "5.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.1.7",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.9.21",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.10",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.14",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2022-05-10T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-02T18:58:19.924Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29145",
            },
         ],
         title: ".NET and Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2022-29145",
      datePublished: "2022-05-10T20:34:56",
      dateReserved: "2022-04-12T00:00:00",
      dateUpdated: "2025-01-02T18:58:19.924Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-28932
Vulnerability from cvelistv5
Published
2024-04-09 17:00
Modified
2025-01-23 01:11
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft SQL Server 2022 for (CU 12) Version: 16.0.0   < 16.0.4120.1
Create a notification for this product.
   Microsoft Microsoft SQL Server 2019 (CU 25) Version: 15.0.0   < 15.0.4360.2
Create a notification for this product.
   Microsoft Microsoft SQL Server 2019 (GDR) Version: 15.0.0   < 15.0.2110.4
Create a notification for this product.
   Microsoft Microsoft SQL Server 2022 (GDR) Version: 16.0.0   < 16.0.1115.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Windows Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Linux Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on MacOS Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Windows Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Linux Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on MacOS Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Version: 16.11.0   < 16.11.35
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.9 Version: 17.0   < 17.9.6
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.18
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.14
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.8 Version: 17.8.0   < 17.8.9
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-28932",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-11T18:08:26.723573Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-11T18:08:37.536Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T01:03:51.356Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28932",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 for (CU 12)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.4120.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (CU 25)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.4360.2",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.2110.4",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.1115.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.35",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.9",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.9.6",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.18",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.14",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.9",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.4120.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.4360.2",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.2110.4",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.1115.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.35",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.9.6",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.18",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.14",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.9",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-04-09T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "CWE-122: Heap-based Buffer Overflow",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-23T01:11:22.905Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28932",
            },
         ],
         title: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-28932",
      datePublished: "2024-04-09T17:00:28.215Z",
      dateReserved: "2024-03-13T01:26:53.031Z",
      dateUpdated: "2025-01-23T01:11:22.905Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-35825
Vulnerability from cvelistv5
Published
2022-08-09 20:12
Modified
2025-01-02 19:34
Summary
Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T09:44:22.119Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35825",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-35825",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-21T19:55:18.625937Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-21T19:55:28.427Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.50",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.9.24",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.18",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.13",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2012 Update 5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "11.0.61252.0",
                     status: "affected",
                     version: "11.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2013 Update 5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "12.0.40699.0",
                     status: "affected",
                     version: "12.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2015 Update 3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "14.0.27552.0",
                     status: "affected",
                     version: "14.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.7",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.50",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.9.24",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.18",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.13",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update_5:*:*:*:*:*:*",
                           versionEndExcluding: "11.0.61252.0",
                           versionStartIncluding: "11.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update_5:*:*:*:*:*:*",
                           versionEndExcluding: "12.0.40699.0",
                           versionStartIncluding: "12.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update3:*:*:*:*:*:*",
                           versionEndExcluding: "14.0.27552.0",
                           versionStartIncluding: "14.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.7",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2022-08-09T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Remote Code Execution",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-02T19:34:56.178Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35825",
            },
         ],
         title: "Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2022-35825",
      datePublished: "2022-08-09T20:12:22",
      dateReserved: "2022-07-13T00:00:00",
      dateUpdated: "2025-01-02T19:34:56.178Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-20656
Vulnerability from cvelistv5
Published
2024-01-09 17:57
Modified
2024-12-31 18:39
Summary
Visual Studio Elevation of Privilege Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-20656",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-01-30T18:27:10.585358Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-18T20:58:39.220Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T21:59:42.344Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Elevation of Privilege Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20656",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.59",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.23",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.33",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.15",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.11",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2015 Update 3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "14.0.27560.00",
                     status: "affected",
                     version: "14.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.59",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.23",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.33",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.15",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.11",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update3:*:*:*:*:*:*",
                           versionEndExcluding: "14.0.27560.00",
                           versionStartIncluding: "14.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-01-09T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-59",
                     description: "CWE-59: Improper Link Resolution Before File Access ('Link Following')",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-31T18:39:40.313Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20656",
            },
         ],
         title: "Visual Studio Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-20656",
      datePublished: "2024-01-09T17:57:01.850Z",
      dateReserved: "2023-11-28T22:58:12.114Z",
      dateUpdated: "2024-12-31T18:39:40.313Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-33127
Vulnerability from cvelistv5
Published
2023-07-11 17:03
Modified
2025-01-01 01:51
Summary
.NET and Visual Studio Elevation of Privilege Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T15:39:35.413Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET and Visual Studio Elevation of Privilege Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33127",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.20",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.9",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.23",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.17",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.9",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.5",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.13",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.3.6",
                     status: "affected",
                     version: "7.3.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.20",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.9",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.23",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.17",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.9",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.5",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.13",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.3.6",
                           versionStartIncluding: "7.3.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-07-11T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-1220",
                     description: "CWE-1220: Insufficient Granularity of Access Control",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T01:51:49.527Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33127",
            },
         ],
         title: ".NET and Visual Studio Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-33127",
      datePublished: "2023-07-11T17:03:05.826Z",
      dateReserved: "2023-05-17T21:16:44.895Z",
      dateUpdated: "2025-01-01T01:51:49.527Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36897
Vulnerability from cvelistv5
Published
2023-08-08 17:08
Modified
2025-01-01 01:59
Summary
Visual Studio Tools for Office Runtime Spoofing Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:01:09.643Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Tools for Office Runtime Spoofing Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36897",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-36897",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-11T18:55:48.486878Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-11T18:58:02.478Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "32-bit Systems",
                  "x64-based Systems",
               ],
               product: "Microsoft Office 2019",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "https://aka.ms/OfficeSecurityReleases",
                     status: "affected",
                     version: "19.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "32-bit Systems",
                  "x64-based Systems",
               ],
               product: "Microsoft 365 Apps for Enterprise",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "https://aka.ms/OfficeSecurityReleases",
                     status: "affected",
                     version: "16.0.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
                  "32-bit Systems",
               ],
               product: "Microsoft Office LTSC 2021",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "https://aka.ms/OfficeSecurityReleases",
                     status: "affected",
                     version: "16.0.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.56",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.18",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.29",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.10",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.6",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Visual Studio 2010 Tools for Office Runtime",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.60910",
                     status: "affected",
                     version: "10.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "https://aka.ms/OfficeSecurityReleases",
                           versionStartIncluding: "19.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:365_apps:*:*:*:*:enterprise:*:*:*",
                           versionEndExcluding: "https://aka.ms/OfficeSecurityReleases",
                           versionStartIncluding: "16.0.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:office_long_term_servicing_channel:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "https://aka.ms/OfficeSecurityReleases",
                           versionStartIncluding: "16.0.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.56",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.18",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.29",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.10",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.6",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2010_tools_for_office_runtime:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.60910",
                           versionStartIncluding: "10.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-08-08T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Tools for Office Runtime Spoofing Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-20",
                     description: "CWE-20: Improper Input Validation",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T01:59:12.128Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Tools for Office Runtime Spoofing Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36897",
            },
         ],
         title: "Visual Studio Tools for Office Runtime Spoofing Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-36897",
      datePublished: "2023-08-08T17:08:53.174Z",
      dateReserved: "2023-06-27T20:28:49.988Z",
      dateUpdated: "2025-01-01T01:59:12.128Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-24767
Vulnerability from cvelistv5
Published
2022-04-12 17:51
Modified
2024-10-01 14:53
Summary
GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T04:20:50.454Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24767",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 7.8,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "REQUIRED",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2022-24767",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-01-31T15:23:28.548160Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-427",
                        description: "CWE-427 Uncontrolled Search Path Element",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-01T14:53:40.641Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     status: "affected",
                     version: "unspecified",
                  },
               ],
            },
            {
               product: "Microsoft Visual Studio 2022 version 17.1",
               vendor: "Microsoft",
               versions: [
                  {
                     status: "affected",
                     version: "unspecified",
                  },
               ],
            },
            {
               product: "Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)",
               vendor: "Microsoft",
               versions: [
                  {
                     status: "affected",
                     version: "unspecified",
                  },
               ],
            },
            {
               product: "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     status: "affected",
                     version: "unspecified",
                  },
               ],
            },
            {
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     status: "affected",
                     version: "unspecified",
                  },
               ],
            },
            {
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     status: "affected",
                     version: "unspecified",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-04-15T19:58:54",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24767",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security-advisories@github.com",
               ID: "CVE-2022-24767",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Microsoft Visual Studio 2022 version 17.1",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Microsoft Visual Studio 2022 version 17.0",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Microsoft",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24767",
                     refsource: "MISC",
                     url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24767",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2022-24767",
      datePublished: "2022-04-12T17:51:04",
      dateReserved: "2022-02-10T00:00:00",
      dateUpdated: "2024-10-01T14:53:40.641Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-38178
Vulnerability from cvelistv5
Published
2023-08-08 17:08
Modified
2025-01-01 01:59
Summary
.NET Core and Visual Studio Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-38178",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-29T18:24:24.810142Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:28:14.188Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:30:14.066Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET Core and Visual Studio Denial of Service Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.21",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.18",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.10",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.21",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.18",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.10",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-08-08T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET Core and Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-400",
                     description: "CWE-400: Uncontrolled Resource Consumption",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T01:59:15.830Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET Core and Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178",
            },
         ],
         title: ".NET Core and Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-38178",
      datePublished: "2023-08-08T17:08:57.014Z",
      dateReserved: "2023-07-12T23:41:45.865Z",
      dateUpdated: "2025-01-01T01:59:15.830Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36558
Vulnerability from cvelistv5
Published
2023-11-14 21:35
Modified
2025-01-01 02:15
Summary
ASP.NET Core Security Feature Bypass Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-36558",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-06-28T14:17:29.323763Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-28T14:17:40.113Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T16:52:52.402Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "ASP.NET Core - Security Feature Bypass Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36558",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.25",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "ASP.NET Core 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.25",
                     status: "affected",
                     version: "6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.14",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.22",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.0",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.14",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.10",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.7",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.7.7",
                     status: "affected",
                     version: "17.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "ASP.NET Core 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.14",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "ASP.NET Core 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.0",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.25",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.25",
                           versionStartIncluding: "6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.14",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.22",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.0",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.14",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.10",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.7.7",
                           versionStartIncluding: "17.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.14",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.0",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-11-14T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "ASP.NET Core Security Feature Bypass Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 6.2,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Security Feature Bypass",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T02:15:57.767Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "ASP.NET Core Security Feature Bypass Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36558",
            },
         ],
         title: "ASP.NET Core Security Feature Bypass Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-36558",
      datePublished: "2023-11-14T21:35:31.499Z",
      dateReserved: "2023-06-23T20:11:38.789Z",
      dateUpdated: "2025-01-01T02:15:57.767Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-23381
Vulnerability from cvelistv5
Published
2023-02-14 20:09
Modified
2025-01-01 00:41
Summary
Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-23381",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-23T17:49:25.568186Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-23T17:49:29.460Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:28:40.951Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23381",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.24",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.19",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.13",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.52",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.5",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2013 Update 5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "12.0.40700.0",
                     status: "affected",
                     version: "12.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2015 Update 3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "14.0.27555.0",
                     status: "affected",
                     version: "14.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.24",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.19",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.13",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.52",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.5",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update_5:*:*:*:*:*:*",
                           versionEndExcluding: "12.0.40700.0",
                           versionStartIncluding: "12.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update3:*:*:*:*:*:*",
                           versionEndExcluding: "14.0.27555.0",
                           versionStartIncluding: "14.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-02-14T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "CWE-122: Heap-based Buffer Overflow",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T00:41:21.901Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23381",
            },
         ],
         title: "Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-23381",
      datePublished: "2023-02-14T20:09:59.470Z",
      dateReserved: "2023-01-11T22:08:03.134Z",
      dateUpdated: "2025-01-01T00:41:21.901Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-28930
Vulnerability from cvelistv5
Published
2024-04-09 17:01
Modified
2025-01-23 01:12
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft SQL Server 2019 (CU 25) Version: 15.0.0   < 15.0.4360.2
Create a notification for this product.
   Microsoft Microsoft SQL Server 2022 for (CU 12) Version: 16.0.0   < 16.0.4120.1
Create a notification for this product.
   Microsoft Microsoft SQL Server 2019 (GDR) Version: 15.0.0   < 15.0.2110.4
Create a notification for this product.
   Microsoft Microsoft SQL Server 2022 (GDR) Version: 16.0.0   < 16.0.1115.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Windows Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on Linux Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 17 for SQL Server on MacOS Version: 17.0.0.0   < 17.10.6.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Windows Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on Linux Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft ODBC Driver 18 for SQL Server on MacOS Version: 18.0.0.0   < 18.3.3.1
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Version: 16.11.0   < 16.11.35
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.9 Version: 17.0   < 17.9.6
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.18
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.14
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.8 Version: 17.8.0   < 17.8.9
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-28930",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-18T15:43:31.008624Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-08T15:35:37.350Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T01:03:51.397Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28930",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (CU 25)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.4360.2",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 for (CU 12)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.4120.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2019 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.0.2110.4",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "x64-based Systems",
               ],
               product: "Microsoft SQL Server 2022 (GDR)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.0.1115.1",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 17 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.6.1",
                     status: "affected",
                     version: "17.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft ODBC Driver 18 for SQL Server on MacOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "18.3.3.1",
                     status: "affected",
                     version: "18.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.35",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.9",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.9.6",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.18",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.14",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.9",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.4360.2",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.4120.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "15.0.2110.4",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
                           versionEndExcluding: "16.0.1115.1",
                           versionStartIncluding: "16.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.6.1",
                           versionStartIncluding: "17.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "18.3.3.1",
                           versionStartIncluding: "18.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.35",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.9.6",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.18",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.14",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.9",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-04-09T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-191",
                     description: "CWE-191: Integer Underflow (Wrap or Wraparound)",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-23T01:12:04.726Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28930",
            },
         ],
         title: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-28930",
      datePublished: "2024-04-09T17:01:13.416Z",
      dateReserved: "2024-03-13T01:26:53.031Z",
      dateUpdated: "2025-01-23T01:12:04.726Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-35391
Vulnerability from cvelistv5
Published
2023-08-08 18:52
Modified
2025-01-01 01:59
Summary
ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T16:23:59.717Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35391",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-35391",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-11T18:55:14.681715Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-11T18:57:48.798Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.18",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.10",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.6",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "ASP.NET Core 2.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "2.1.40",
                     status: "affected",
                     version: "2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.21",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.10",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.18",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.10",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.6",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "2.1.40",
                           versionStartIncluding: "2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.21",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.10",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-08-08T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 6.2,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T01:59:13.738Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35391",
            },
         ],
         title: "ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-35391",
      datePublished: "2023-08-08T18:52:30.105Z",
      dateReserved: "2023-06-14T23:09:47.640Z",
      dateUpdated: "2025-01-01T01:59:13.738Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-33135
Vulnerability from cvelistv5
Published
2023-06-13 23:26
Modified
2025-01-01 01:44
Summary
.NET and Visual Studio Elevation of Privilege Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-33135",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-12T14:58:48.967130Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-12T14:59:00.865Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T15:39:35.999Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET and Visual Studio Elevation of Privilege Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33135",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.18",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.7",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.16",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.22",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.8",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.3",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.18",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.7",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.16",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.22",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.8",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.3",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-06-13T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.3,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T01:44:15.801Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33135",
            },
         ],
         title: ".NET and Visual Studio Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-33135",
      datePublished: "2023-06-13T23:26:26.390Z",
      dateReserved: "2023-05-17T21:16:44.896Z",
      dateUpdated: "2025-01-01T01:44:15.801Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-43499
Vulnerability from cvelistv5
Published
2024-11-12 17:53
Modified
2025-02-04 16:50
Summary
.NET and Visual Studio Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 7.5,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "NONE",
                     integrityImpact: "NONE",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2024-43499",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-11-13T16:28:19.318382Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        description: "CWE-noinfo Not enough information",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-04T16:50:10.302Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.21",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.9",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.16",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.11",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.11.6",
                     status: "affected",
                     version: "17.11",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.5.0",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 9.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "9.0.0",
                     status: "affected",
                     version: "9.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.21",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.9",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.16",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.11.6",
                           versionStartIncluding: "17.11",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.5.0",
                           versionStartIncluding: "7.5.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "9.0.0",
                           versionStartIncluding: "9.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-11-12T08:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-409",
                     description: "CWE-409: Improper Handling of Highly Compressed Data (Data Amplification)",
                     lang: "en-US",
                     type: "CWE",
                  },
                  {
                     cweId: "CWE-606",
                     description: "CWE-606: Unchecked Input for Loop Condition",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-30T00:09:37.647Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43499",
            },
         ],
         title: ".NET and Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-43499",
      datePublished: "2024-11-12T17:53:35.848Z",
      dateReserved: "2024-08-14T01:08:33.522Z",
      dateUpdated: "2025-02-04T16:50:10.302Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-43877
Vulnerability from cvelistv5
Published
2021-12-15 14:15
Modified
2024-08-04 04:10
Summary
ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) Version: 16.0.0   < 16.7.23
    cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8) Version: 15.0.0   < 16.9.15
    cpe:2.3:a:microsoft:visual_studio_2019:16.9:*:*:*:*:*:*:*
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Version: 16.11.0   < 16.11.8
    cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.0 Version: 17.0.0   < 17.0.3
    cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*
Create a notification for this product.
   Microsoft ASP.NET Core 3.1 Version: 3.0   < 3.1.22
    cpe:2.3:a:microsoft:asp.net_core:3.1:*:*:*:*:*:*:*
Create a notification for this product.
   Microsoft ASP.NET Core 5.0 Version: 5.0   < 5.0.13
    cpe:2.3:a:microsoft:asp.net_core:5.0:*:*:*:*:*:*:*
Create a notification for this product.
   Microsoft ASP.NET Core 6.0 Version: 6.0   < 6.0.101
    cpe:2.3:a:microsoft:asp.net_core:6.0:*:*:*:*:*:*:*
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.1 Version: 17.0.0   < 17.1.4
    cpe:2.3:a:microsoft:visual_studio_2022:17.1:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T04:10:17.113Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43877",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               cpes: [
                  "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
               ],
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.7.23",
                     status: "affected",
                     version: "16.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               cpes: [
                  "cpe:2.3:a:microsoft:visual_studio_2019:16.9:*:*:*:*:*:*:*",
               ],
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.9.15",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               cpes: [
                  "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
               ],
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.8",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               cpes: [
                  "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*",
               ],
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.3",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               cpes: [
                  "cpe:2.3:a:microsoft:asp.net_core:3.1:*:*:*:*:*:*:*",
               ],
               platforms: [
                  "Unknown",
               ],
               product: "ASP.NET Core 3.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.1.22",
                     status: "affected",
                     version: "3.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               cpes: [
                  "cpe:2.3:a:microsoft:asp.net_core:5.0:*:*:*:*:*:*:*",
               ],
               platforms: [
                  "Unknown",
               ],
               product: "ASP.NET Core 5.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "5.0.13",
                     status: "affected",
                     version: "5.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               cpes: [
                  "cpe:2.3:a:microsoft:asp.net_core:6.0:*:*:*:*:*:*:*",
               ],
               platforms: [
                  "Unknown",
               ],
               product: "ASP.NET Core 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.101",
                     status: "affected",
                     version: "6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               cpes: [
                  "cpe:2.3:a:microsoft:visual_studio_2022:17.1:*:*:*:*:*:*:*",
               ],
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.1.4",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-12-14T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-29T14:44:33.540Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43877",
            },
         ],
         title: "ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2021-43877",
      datePublished: "2021-12-15T14:15:31",
      dateReserved: "2021-11-16T00:00:00",
      dateUpdated: "2024-08-04T04:10:17.113Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36758
Vulnerability from cvelistv5
Published
2023-09-12 16:58
Modified
2025-01-01 02:04
Summary
Visual Studio Elevation of Privilege Vulnerability
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T16:52:54.221Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Elevation of Privilege Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36758",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.7",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.7.4",
                     status: "affected",
                     version: "17.7.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.7.4",
                           versionStartIncluding: "17.7.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-09-12T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-59",
                     description: "CWE-59: Improper Link Resolution Before File Access ('Link Following')",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T02:04:22.265Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36758",
            },
         ],
         title: "Visual Studio Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-36758",
      datePublished: "2023-09-12T16:58:30.263Z",
      dateReserved: "2023-06-27T15:11:59.867Z",
      dateUpdated: "2025-01-01T02:04:22.265Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-28296
Vulnerability from cvelistv5
Published
2023-04-11 19:13
Modified
2025-01-23 01:05
Summary
Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T12:38:24.531Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28296",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.54",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.15",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.26",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.21",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.7",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.5.4",
                     status: "affected",
                     version: "17.5.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.54",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.15",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.26",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.21",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.7",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.5.4",
                           versionStartIncluding: "17.5.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-04-11T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-415",
                     description: "CWE-415: Double Free",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-23T01:05:20.136Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28296",
            },
         ],
         title: "Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-28296",
      datePublished: "2023-04-11T19:13:58.852Z",
      dateReserved: "2023-03-13T22:23:36.188Z",
      dateUpdated: "2025-01-23T01:05:20.136Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-0057
Vulnerability from cvelistv5
Published
2024-01-09 17:56
Modified
2024-12-31 18:39
Summary
NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability
Impacted products
Vendor Product Version
Microsoft .NET 8.0 Version: 1.0.0   < 8.0.1
Create a notification for this product.
   Microsoft .NET 7.0 Version: 7.0.0   < 7.0.15
Create a notification for this product.
   Microsoft .NET 6.0 Version: 6.0.0   < 6.0.26
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.2 Version: 17.2.0   < 17.2.23
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Version: 16.11.0   < 16.11.34
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.15
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.11
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.8 Version: 17.8.0   < 17.8.4
Create a notification for this product.
   Microsoft NuGet 5.11.0 Version: 5.11.0   < 5.11.6.0
Create a notification for this product.
   Microsoft NuGet 17.4.0 Version: 17.4.0   < 17.4.3.0
Create a notification for this product.
   Microsoft NUGET 17.6.0 Version: 17.6.0   < 17.6.2.0
Create a notification for this product.
   Microsoft NuGet 17.8.0 Version: 17.8.0   < 17.8.1.0
Create a notification for this product.
   Microsoft PowerShell 7.2 Version: 7.2.0   < 7.2.18
Create a notification for this product.
   Microsoft PowerShell 7.3 Version: 7.3.0   < 7.3.11
Create a notification for this product.
   Microsoft PowerShell 7.4 Version: 7.4.0   < 7.4.2
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.8 Version: 4.8.0   < 4.8.04690.02
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8 Version: 4.8.0   < 4.8.04690.02
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.7.2 Version: 4.7.0   < 4.7.04081.03
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 Version: 4.7.0   < 4.7.04081.02
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8.1 Version: 4.8.1   < 4.8.09214.01
Create a notification for this product.
   Microsoft Microsoft .NET Framework 2.0 Service Pack 2 Version: 2.0.0   < 3.0.50727.8976
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.0 Service Pack 2 Version: 3.0.0   < 3.0.50727.8976
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T17:41:15.867Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0057",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20240208-0007/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.1",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.15",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.26",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.23",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.34",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.15",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.11",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.4",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "NuGet 5.11.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "5.11.6.0",
                     status: "affected",
                     version: "5.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "NuGet 17.4.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.3.0",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "NUGET 17.6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.2.0",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "NuGet 17.8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.1.0",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.18",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.3.11",
                     status: "affected",
                     version: "7.3.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.4.2",
                     status: "affected",
                     version: "7.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.04690.02",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.04690.02",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows 10 Version 1809 for ARM64-based Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows Server 2016",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04081.03",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04081.02",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 11 Version 22H2 for ARM64-based Systems",
                  "Windows 11 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
                  "Windows 11 Version 23H2 for ARM64-based Systems",
                  "Windows 11 Version 23H2 for x64-based Systems",
                  "Windows Server 2022, 23H2 Edition (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.09214.01",
                     status: "affected",
                     version: "4.8.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 2.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.50727.8976",
                     status: "affected",
                     version: "2.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
               ],
               product: "Microsoft .NET Framework 3.0 Service Pack 2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "3.0.50727.8976",
                     status: "affected",
                     version: "3.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.1",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.15",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.26",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.23",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.34",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.15",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.11",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.4",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:nuget:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "5.11.6.0",
                           versionStartIncluding: "5.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:nuget:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.3.0",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:nuget:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.2.0",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:nuget:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.1.0",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.18",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.3.11",
                           versionStartIncluding: "7.3.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.4.2",
                           versionStartIncluding: "7.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.04690.02",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.04690.02",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04081.03",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04081.02",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.09214.01",
                           versionStartIncluding: "4.8.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.50727.8976",
                           versionStartIncluding: "2.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:sp2:*:*:*:*:*:*",
                           versionEndExcluding: "3.0.50727.8976",
                           versionStartIncluding: "3.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-01-09T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 9.1,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-20",
                     description: "CWE-20: Improper Input Validation",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-31T18:39:37.846Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0057",
            },
         ],
         title: "NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-0057",
      datePublished: "2024-01-09T17:56:59.552Z",
      dateReserved: "2023-11-22T17:43:37.319Z",
      dateUpdated: "2024-12-31T18:39:37.846Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-21815
Vulnerability from cvelistv5
Published
2023-02-14 20:09
Modified
2025-01-01 00:41
Summary
Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-21815",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-06-14T16:14:09.107938Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-14T16:14:19.107Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:51:51.156Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21815",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.52",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.13",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.24",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.19",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2013 Update 5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "12.0.40700.0",
                     status: "affected",
                     version: "12.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2015 Update 3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "14.0.27555.0",
                     status: "affected",
                     version: "14.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.5",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.52",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.13",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.24",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.19",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update_5:*:*:*:*:*:*",
                           versionEndExcluding: "12.0.40700.0",
                           versionStartIncluding: "12.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update3:*:*:*:*:*:*",
                           versionEndExcluding: "14.0.27555.0",
                           versionStartIncluding: "14.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.5",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-02-14T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-191",
                     description: "CWE-191: Integer Underflow (Wrap or Wraparound)",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T00:41:03.370Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21815",
            },
         ],
         title: "Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-21815",
      datePublished: "2023-02-14T20:09:31.025Z",
      dateReserved: "2022-12-16T22:13:41.244Z",
      dateUpdated: "2025-01-01T00:41:03.370Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-21808
Vulnerability from cvelistv5
Published
2023-02-14 20:09
Modified
2025-02-28 21:13
Summary
.NET and Visual Studio Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Version: 16.11.0   < 16.11.24
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.0 Version: 17.0.0   < 17.0.19
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) Version: 15.9.0   < 15.9.52
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.5
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.2 Version: 17.2.0   < 17.2.13
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2015 Update 3 Version: 14.0.0   < 14.0.27555.0
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2013 Update 5 Version: 12.0.0   < 12.0.40700.0
Create a notification for this product.
   Microsoft .NET 7.0 Version: 7.0.0   < 7.0.3
Create a notification for this product.
   Microsoft .NET 6.0 Version: 6.0.0   < 6.0.14
Create a notification for this product.
   Microsoft PowerShell 7.2 Version: 7.2.0   < 7.2.10
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8 Version: 4.8.0   < 10.0.04614.06
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.7.2 Version: 4.7.0   < 10.0.04038.03
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 Version: 4.7.0   < 4.7.04614.08
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.8 Version: 4.8.0   < 4.8.04614.05
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8.1 Version: 4.8.1   < 10.0.09139.02
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2 Version: 4.7.0   < 4.7.04038.06
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 and 4.6.2 Version: 4.7.0   < 10.0.10240.19747
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:51:50.928Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET and Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21808",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-21808",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-28T20:23:13.694036Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-28T21:13:45.998Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.24",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.19",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.52",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.5",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.13",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2015 Update 3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "14.0.27555.0",
                     status: "affected",
                     version: "14.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2013 Update 5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "12.0.40700.0",
                     status: "affected",
                     version: "12.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.3",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.14",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.10",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows Server 2022",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows 10 Version 20H2 for ARM64-based Systems",
                  "Windows 10 Version 20H2 for 32-bit Systems",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows Server 2019",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows 10 Version 22H2 for 32-bit Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.04614.06",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows 10 Version 1809 for ARM64-based Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows Server 2016",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.04038.03",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 R2 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
               ],
               product: "Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04614.08",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2012 R2 (Server Core installation)",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012",
               ],
               product: "Microsoft .NET Framework 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.04614.05",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2022 (Server Core installation)",
                  "Windows Server 2022",
                  "Windows 10 Version 20H2 for 32-bit Systems",
                  "Windows 10 Version 20H2 for ARM64-based Systems",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 11 Version 22H2 for ARM64-based Systems",
                  "Windows 11 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.09139.02",
                     status: "affected",
                     version: "4.8.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04038.06",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 for 32-bit Systems",
                  "Windows 10 for x64-based Systems",
               ],
               product: "Microsoft .NET Framework 3.5 and 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.10240.19747",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.24",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.19",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.52",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.5",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.13",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update3:*:*:*:*:*:*",
                           versionEndExcluding: "14.0.27555.0",
                           versionStartIncluding: "14.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update_5:*:*:*:*:*:*",
                           versionEndExcluding: "12.0.40700.0",
                           versionStartIncluding: "12.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.3",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.14",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.10",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.04614.06",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.04038.03",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04614.08",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.04614.05",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.09139.02",
                           versionStartIncluding: "4.8.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04038.06",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.10240.19747",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-02-14T08:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-416",
                     description: "CWE-416: Use After Free",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T00:41:01.018Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21808",
            },
         ],
         title: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-21808",
      datePublished: "2023-02-14T20:09:27.030Z",
      dateReserved: "2022-12-16T22:13:41.241Z",
      dateUpdated: "2025-02-28T21:13:45.998Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-35826
Vulnerability from cvelistv5
Published
2022-08-09 20:12
Modified
2025-01-02 19:34
Summary
Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T09:44:22.069Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35826",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-35826",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-21T19:26:13.774576Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-21T19:26:26.305Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.50",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.9.24",
                     status: "affected",
                     version: "15.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.18",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.13",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2012 Update 5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "11.0.61252.0",
                     status: "affected",
                     version: "11.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2013 Update 5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "12.0.40699.0",
                     status: "affected",
                     version: "12.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2015 Update 3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "14.0.27552.0",
                     status: "affected",
                     version: "14.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.7",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.50",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.9.24",
                           versionStartIncluding: "15.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.18",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.13",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update_5:*:*:*:*:*:*",
                           versionEndExcluding: "11.0.61252.0",
                           versionStartIncluding: "11.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update_5:*:*:*:*:*:*",
                           versionEndExcluding: "12.0.40699.0",
                           versionStartIncluding: "12.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update3:*:*:*:*:*:*",
                           versionEndExcluding: "14.0.27552.0",
                           versionStartIncluding: "14.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.7",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2022-08-09T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Remote Code Execution",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-02T19:34:56.811Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35826",
            },
         ],
         title: "Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2022-35826",
      datePublished: "2022-08-09T20:12:36",
      dateReserved: "2022-07-13T00:00:00",
      dateUpdated: "2025-01-02T19:34:56.811Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-38095
Vulnerability from cvelistv5
Published
2024-07-09 17:03
Modified
2025-03-11 16:40
Summary
.NET and Visual Studio Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-38095",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-09T20:02:27.324531Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-09T20:02:36.933Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T04:04:25.264Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET and Visual Studio Denial of Service Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38095",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.4.4",
                     status: "affected",
                     version: "7.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.22",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.32",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.7",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.21",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.17",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.12",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.4",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.4.4",
                           versionStartIncluding: "7.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.22",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.32",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.7",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.21",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.17",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.12",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.4",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-07-09T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-20",
                     description: "CWE-20: Improper Input Validation",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-11T16:40:24.982Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38095",
            },
         ],
         title: ".NET and Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-38095",
      datePublished: "2024-07-09T17:03:24.803Z",
      dateReserved: "2024-06-11T22:36:08.184Z",
      dateUpdated: "2025-03-11T16:40:24.982Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2025-21171
Vulnerability from cvelistv5
Published
2025-01-14 18:03
Modified
2025-04-02 13:22
Summary
.NET Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2025-21171",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-27T00:00:00+00:00",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-28T04:55:37.474Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.5.0",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 9.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "9.0.1",
                     status: "affected",
                     version: "9.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.12",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.12.4",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.22",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.17",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.10",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.5.0",
                           versionStartIncluding: "7.5.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "9.0.1",
                           versionStartIncluding: "9.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.12.4",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.22",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.17",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.10",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2025-01-14T08:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "CWE-122: Heap-based Buffer Overflow",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-04-02T13:22:58.474Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21171",
            },
         ],
         title: ".NET Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2025-21171",
      datePublished: "2025-01-14T18:03:22.942Z",
      dateReserved: "2024-12-05T21:43:30.760Z",
      dateUpdated: "2025-04-02T13:22:58.474Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36042
Vulnerability from cvelistv5
Published
2023-11-14 17:57
Modified
2025-01-01 02:16
Summary
Visual Studio Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-36042",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-09T20:30:08.752355Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-09T20:30:19.490Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T16:37:41.319Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Denial of Service Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36042",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.10",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.7",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.7.7",
                     status: "affected",
                     version: "17.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 11 Version 22H2 for ARM64-based Systems",
                  "Windows 11 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
                  "Windows 11 Version 23H2 for ARM64-based Systems",
                  "Windows 11 Version 23H2 for x64-based Systems",
                  "Windows Server 2022, 23H2 Edition (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.09214.01",
                     status: "affected",
                     version: "4.8.1",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.10",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.7.7",
                           versionStartIncluding: "17.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.09214.01",
                           versionStartIncluding: "4.8.1",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-11-14T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 6.2,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "CWE-122: Heap-based Buffer Overflow",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T02:16:11.823Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36042",
            },
         ],
         title: "Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-36042",
      datePublished: "2023-11-14T17:57:31.934Z",
      dateReserved: "2023-06-20T20:44:39.828Z",
      dateUpdated: "2025-01-01T02:16:11.823Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-24897
Vulnerability from cvelistv5
Published
2023-06-14 14:52
Modified
2025-01-01 01:43
Summary
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) Version: 15.9.0   < 15.9.55
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.2 Version: 17.2.0   < 17.2.16
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Version: 16.11.0   < 16.11.27
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.0 Version: 17.0.0   < 17.0.22
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.4 Version: 17.4.0   < 17.4.8
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2013 Update 5 Version: 12.0.0   < 12.0.40700.0
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2015 Update 3 Version: 14.0.0   < 14.0.27555.0
Create a notification for this product.
   Microsoft .NET 7.0 Version: 7.0.0   < 7.0.7
Create a notification for this product.
   Microsoft .NET 6.0 Version: 6.0.0   < 6.0.18
Create a notification for this product.
   Microsoft Microsoft Visual Studio 2022 version 17.6 Version: 17.6.0   < 17.6.3
Create a notification for this product.
   Microsoft PowerShell 7.2 Version: 7.2.0   < 7.2.12
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8 Version: 4.8.0   < 4.8.4644.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.8 Version: 4.8.0   < 4.8.4644.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.7.2 Version: 4.7.0   < 4.7.4050.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 Version: 3.0.0.0   < 10.0.14393.5989
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 Version: 4.7.0   < 4.7.04043.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 AND 4.8.1 Version: 4.8.1   < 4.8.9166.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 4.6.2 Version: 4.7.0   < 4.7.04043.0
Create a notification for this product.
   Microsoft Microsoft .NET Framework 3.5 and 4.6.2 Version: 4.7.0   < 10.0.10240.19983
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T11:11:43.453Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24897",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-24897",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-27T19:43:18.398305Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-27T19:43:32.943Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.55",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.16",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.27",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.22",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.8",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2013 Update 5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "12.0.40700.0",
                     status: "affected",
                     version: "12.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2015 Update 3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "14.0.27555.0",
                     status: "affected",
                     version: "14.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.7",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.18",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.3",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.12",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows Server 2019",
                  "Windows 10 Version 1809 for x64-based Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.4644.0",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows Server 2012",
                  "Windows Server 2016",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2012 R2 (Server Core installation)",
                  "Windows Server 2012 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.4644.0",
                     status: "affected",
                     version: "4.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows 10 Version 1809 for ARM64-based Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.4050.0",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2016",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows 10 Version 1607 for 32-bit Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.14393.5989",
                     status: "affected",
                     version: "3.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
                  "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
                  "Windows Server 2012",
                  "Windows Server 2012 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04043.0",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 11 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
                  "Windows 11 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
               ],
               product: "Microsoft .NET Framework 3.5 AND 4.8.1",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.8.9166.0",
                     status: "affected",
                     version: "4.8.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)",
                  "Windows Server 2008 for 32-bit Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2",
                  "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)",
               ],
               product: "Microsoft .NET Framework 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "4.7.04043.0",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 for 32-bit Systems",
                  "Windows 10 for x64-based Systems",
               ],
               product: "Microsoft .NET Framework 3.5 and 4.6.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.10240.19983",
                     status: "affected",
                     version: "4.7.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.55",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.16",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.27",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.22",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.8",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update_5:*:*:*:*:*:*",
                           versionEndExcluding: "12.0.40700.0",
                           versionStartIncluding: "12.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update3:*:*:*:*:*:*",
                           versionEndExcluding: "14.0.27555.0",
                           versionStartIncluding: "14.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.7",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.18",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.3",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.12",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.4644.0",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.4644.0",
                           versionStartIncluding: "4.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.4050.0",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.14393.5989",
                           versionStartIncluding: "3.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04043.0",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.8.9166.0",
                           versionStartIncluding: "4.8.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.7.04043.0",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.10240.19983",
                           versionStartIncluding: "4.7.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-06-13T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "CWE-122: Heap-based Buffer Overflow",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T01:43:32.304Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24897",
            },
         ],
         title: ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-24897",
      datePublished: "2023-06-14T14:52:10.089Z",
      dateReserved: "2023-01-31T20:32:35.472Z",
      dateUpdated: "2025-01-01T01:43:32.304Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-21386
Vulnerability from cvelistv5
Published
2024-02-13 18:02
Modified
2024-12-31 18:51
Summary
.NET Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-21386",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-02-21T20:15:43.069264Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-05T17:21:00.305Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:20:40.599Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET Denial of Service Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21386",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "ASP.NET Core 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.27",
                     status: "affected",
                     version: "6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "ASP.NET Core 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.16",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "ASP.NET Core 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.2",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.16",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.12",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.7",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.27",
                           versionStartIncluding: "6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.16",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.2",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.16",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.12",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.7",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-02-13T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-400",
                     description: "CWE-400: Uncontrolled Resource Consumption",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-31T18:51:45.396Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21386",
            },
         ],
         title: ".NET Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-21386",
      datePublished: "2024-02-13T18:02:20.218Z",
      dateReserved: "2023-12-08T22:45:20.453Z",
      dateUpdated: "2024-12-31T18:51:45.396Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-30046
Vulnerability from cvelistv5
Published
2024-05-14 16:57
Modified
2024-12-31 19:04
Summary
Visual Studio Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-30046",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-15T16:43:57.442813Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:38:33.988Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T01:25:02.716Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Denial of Service Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30046",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.19",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.5",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.9",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.9.7",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.19",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.15",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.10",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.19",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.5",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.9.7",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.19",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.15",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.10",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-05-14T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-362",
                     description: "CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-31T19:04:32.759Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30046",
            },
         ],
         title: "Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-30046",
      datePublished: "2024-05-14T16:57:30.222Z",
      dateReserved: "2024-03-22T23:12:13.409Z",
      dateUpdated: "2024-12-31T19:04:32.759Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-21319
Vulnerability from cvelistv5
Published
2024-01-09 18:59
Modified
2024-12-31 18:39
Summary
Microsoft Identity Denial of service vulnerability
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:20:39.921Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Microsoft Identity Denial of service vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21319",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.26",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.23",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.11",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.15",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.4",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.15",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.1",
                     status: "affected",
                     version: "1.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Identity Model v6.0.0 forNuget",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.34.0",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Identity Model v7.0.0 for Nuget",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.1.2",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Identity Model v6.0.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.34.0",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Identity Model v5.0.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "5.7.0",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Identity Model v7.0.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.1.2",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Identity Model v5.0.0 for Nuget",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "5.7.0",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.26",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.23",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.11",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.15",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.4",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.15",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.1",
                           versionStartIncluding: "1.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:identitymodel_for_nuget:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.34.0",
                           versionStartIncluding: "0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:identitymodel_for_nuget:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.1.2",
                           versionStartIncluding: "0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:identitymodel:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.34.0",
                           versionStartIncluding: "0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:identitymodel:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "5.7.0",
                           versionStartIncluding: "0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:identitymodel:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.1.2",
                           versionStartIncluding: "0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:identitymodel_for_nuget:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "5.7.0",
                           versionStartIncluding: "0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-01-09T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft Identity Denial of service vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 6.8,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-20",
                     description: "CWE-20: Improper Input Validation",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-31T18:39:52.446Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft Identity Denial of service vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21319",
            },
         ],
         title: "Microsoft Identity Denial of service vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-21319",
      datePublished: "2024-01-09T18:59:01.270Z",
      dateReserved: "2023-12-08T22:45:19.367Z",
      dateUpdated: "2024-12-31T18:39:52.446Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-30052
Vulnerability from cvelistv5
Published
2024-06-11 17:00
Modified
2024-12-31 19:38
Summary
Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-30052",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-06-11T18:40:08.702742Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-11T18:40:17.085Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T01:25:02.976Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30052",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.63",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.37",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.20",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.16",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.11",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.2",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.63",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.37",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.20",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.16",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.11",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.2",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-06-11T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 4.7,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-693",
                     description: "CWE-693: Protection Mechanism Failure",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-31T19:38:06.078Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30052",
            },
         ],
         title: "Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-30052",
      datePublished: "2024-06-11T17:00:10.658Z",
      dateReserved: "2024-03-22T23:12:13.409Z",
      dateUpdated: "2024-12-31T19:38:06.078Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-35390
Vulnerability from cvelistv5
Published
2023-08-08 17:08
Modified
2025-01-01 01:59
Summary
.NET and Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-35390",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-06-04T01:21:48.088404Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:18:41.198Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T16:23:59.883Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: ".NET and Visual Studio Remote Code Execution Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.18",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.10",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.6",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.21",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 7.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.0.10",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.18",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.10",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.6",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.21",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.0.10",
                           versionStartIncluding: "7.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-08-08T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-77",
                     description: "CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-01T01:59:13.153Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390",
            },
         ],
         title: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-35390",
      datePublished: "2023-08-08T17:08:54.243Z",
      dateReserved: "2023-06-14T23:09:47.639Z",
      dateUpdated: "2025-01-01T01:59:13.153Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-43485
Vulnerability from cvelistv5
Published
2024-10-08 17:35
Modified
2025-01-29 23:51
Summary
.NET and Visual Studio Denial of Service Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-43485",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-08T18:54:45.795602Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-09T19:47:57.831Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.2.24",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.4.6",
                     status: "affected",
                     version: "7.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.20",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.15",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.8",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.11",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.11.5",
                     status: "affected",
                     version: "17.11",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "PowerShell 7.5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "7.5.0",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 8.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "8.0.10",
                     status: "affected",
                     version: "8.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: ".NET 6.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "6.0.35",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "7.2.24",
                           versionStartIncluding: "7.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.4.6",
                           versionStartIncluding: "7.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.20",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.15",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.8",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.11.5",
                           versionStartIncluding: "17.11",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*",
                           versionEndExcluding: "7.5.0",
                           versionStartIncluding: "7.5.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "8.0.10",
                           versionStartIncluding: "8.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.0.35",
                           versionStartIncluding: "6.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-10-08T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: ".NET and Visual Studio Denial of Service Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-407",
                     description: "CWE-407: Inefficient Algorithmic Complexity",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-29T23:51:09.897Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: ".NET and Visual Studio Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43485",
            },
         ],
         title: ".NET and Visual Studio Denial of Service Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-43485",
      datePublished: "2024-10-08T17:35:47.290Z",
      dateReserved: "2024-08-14T01:08:33.518Z",
      dateUpdated: "2025-01-29T23:51:09.897Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-28262
Vulnerability from cvelistv5
Published
2023-04-11 19:13
Modified
2025-01-23 01:05
Summary
Visual Studio Elevation of Privilege Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T12:30:24.747Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Visual Studio Elevation of Privilege Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28262",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-28262",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-07T15:40:10.106998Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-07T15:40:19.632Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.2",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.2.15",
                     status: "affected",
                     version: "17.2.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.26",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.0",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.0.21",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.4",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.4.7",
                     status: "affected",
                     version: "17.4.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.5",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.5.4",
                     status: "affected",
                     version: "17.5.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.2.15",
                           versionStartIncluding: "17.2.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.26",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.0.21",
                           versionStartIncluding: "17.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.4.7",
                           versionStartIncluding: "17.4.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.5.4",
                           versionStartIncluding: "17.5.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2023-04-11T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "CWE-122: Heap-based Buffer Overflow",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-23T01:05:18.042Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28262",
            },
         ],
         title: "Visual Studio Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2023-28262",
      datePublished: "2023-04-11T19:13:57.191Z",
      dateReserved: "2023-03-13T22:18:32.393Z",
      dateUpdated: "2025-01-23T01:05:18.042Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2025-21178
Vulnerability from cvelistv5
Published
2025-01-14 18:04
Modified
2025-04-02 13:24
Summary
Visual Studio Remote Code Execution Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2025-21178",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-27T00:00:00+00:00",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-28T04:55:33.238Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "15.9.69",
                     status: "affected",
                     version: "15.9.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "16.11.43",
                     status: "affected",
                     version: "16.11.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.6",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.6.22",
                     status: "affected",
                     version: "17.6.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.8",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.8.17",
                     status: "affected",
                     version: "17.8.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.10",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.10.10",
                     status: "affected",
                     version: "17.10",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2015 Update 3",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "14.0.24252.2",
                     status: "affected",
                     version: "14.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Visual Studio 2022 version 17.12",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "17.12.4",
                     status: "affected",
                     version: "17.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "15.9.69",
                           versionStartIncluding: "15.9.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "16.11.43",
                           versionStartIncluding: "16.11.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.6.22",
                           versionStartIncluding: "17.6.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.8.17",
                           versionStartIncluding: "17.8.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.10.10",
                           versionStartIncluding: "17.10",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:update3:*:*:*:*:*:*",
                           versionEndExcluding: "14.0.24252.2",
                           versionStartIncluding: "14.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "17.12.4",
                           versionStartIncluding: "17.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2025-01-14T08:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Visual Studio Remote Code Execution Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "CWE-122: Heap-based Buffer Overflow",
                     lang: "en-US",
                     type: "CWE",
                  },
                  {
                     cweId: "CWE-125",
                     description: "CWE-125: Out-of-bounds Read",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-04-02T13:24:37.080Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Visual Studio Remote Code Execution Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21178",
            },
         ],
         title: "Visual Studio Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2025-21178",
      datePublished: "2025-01-14T18:04:01.376Z",
      dateReserved: "2024-12-05T21:43:30.761Z",
      dateUpdated: "2025-04-02T13:24:37.080Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2022-03-09 17:15
Modified
2024-11-21 06:50
Summary
.NET and Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8F02D5C-61F1-4381-8D64-8BEB5CED0DC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "1DE0C8DD-9C73-4876-8193-068F18074B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_core:3.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "70BE107E-20A0-4998-A8ED-BCC414C6BDBF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "77F72A4A-239D-4362-B42C-2B125FD977AB",
                     versionEndExcluding: "7.0.9",
                     versionStartIncluding: "7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2C644EF-33B6-440F-8051-6A0D3C096F67",
                     versionEndExcluding: "7.1.6",
                     versionStartIncluding: "7.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD5CE10E-FCBF-4FBA-9B4E-BEB7F7E902A1",
                     versionEndExcluding: "7.2.2",
                     versionStartIncluding: "7.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6222A0C-EC9B-4AB2-A89F-5D62B381A212",
                     versionEndIncluding: "16.6.4",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "367AC9B2-D639-40F6-93FB-822F73E65C30",
                     versionEndExcluding: "16.7.26",
                     versionStartIncluding: "16.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC9599DF-664B-4630-9FCD-7FCD846728A1",
                     versionEndIncluding: "16.8.7",
                     versionStartIncluding: "16.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4338A4F9-0FE2-40F4-B184-86B9F5EF1EED",
                     versionEndExcluding: "16.9.18",
                     versionStartIncluding: "16.9.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B6E2777-4D9B-4710-9575-250B04E1AE0C",
                     versionEndIncluding: "16.10.4",
                     versionStartIncluding: "16.10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1265006-B9CB-4E89-B6E8-F9EC1D6C7405",
                     versionEndExcluding: "16.11.11",
                     versionStartIncluding: "16.11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C72810F-D156-49CE-A325-7E6A63C9E4A3",
                     versionEndExcluding: "17.0.7",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                     matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Ejecución de Código Remota en .NET y Visual Studio",
      },
   ],
   id: "CVE-2022-24512",
   lastModified: "2024-11-21T06:50:34.683",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 6.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.4,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 6.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.4,
            source: "nvd@nist.gov",
            type: "Secondary",
         },
      ],
   },
   published: "2022-03-09T17:15:15.737",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24512",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24512",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-09-12 17:15
Modified
2024-11-21 08:10
Summary
Visual Studio Elevation of Privilege Vulnerability
Impacted products
Vendor Product Version
microsoft visual_studio_2022 *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCE6E2FF-C2E9-4273-9717-D1DC902C2D27",
                     versionEndIncluding: "17.7.4",
                     versionStartIncluding: "17.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Elevation of Privilege Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de Elevación de Privilegios en Visual Studio",
      },
   ],
   id: "CVE-2023-36758",
   lastModified: "2024-11-21T08:10:32.170",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-09-12T17:15:11.267",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36758",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36758",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-59",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-04-09 17:15
Modified
2025-01-14 20:49
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "453652D6-37A7-49BC-8660-330EADA8CCDD",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "422283AD-E25A-4779-BB9A-0E496BFAC524",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "9BDD3D5D-70D5-4767-95DC-25873774B536",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "C8B405E1-CC25-4883-A26D-4A4237E43FB0",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "7236DD21-703E-4359-88AD-E68C3B1D33FE",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "948FC47B-E7FE-404A-A747-18DA61D35A3F",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "DD9CBEE2-6BF0-45E5-8DAA-2749344ECCFE",
                     versionEndExcluding: "15.0.2110.4",
                     versionStartIncluding: "15.0.2000.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C9C35D21-EE02-4562-8196-7A4781DECF06",
                     versionEndExcluding: "15.0.4360.2",
                     versionStartIncluding: "15.0.4003.23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "6A943249-37AA-4E3B-A074-7E87EC4CD040",
                     versionEndExcluding: "16.0.1115.1",
                     versionStartIncluding: "16.0.1000.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "2ADF9550-5FAA-4696-9F59-8D235B989541",
                     versionEndExcluding: "16.0.4120.1",
                     versionStartIncluding: "16.0.4003.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B69AEE86-A505-42EA-ADD3-FB0F6346C2FA",
                     versionEndExcluding: "16.11.35",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8133E65A-AE80-4266-A445-265908DD8E21",
                     versionEndExcluding: "17.4.18",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "35FAD418-A4C1-40C3-8F08-A08CA1190BB0",
                     versionEndExcluding: "17.6.14",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "39E176F7-8E26-4175-98FE-99288ADD2DA3",
                     versionEndExcluding: "17.8.9",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2188B97-2B2C-445A-B667-2C3269B94959",
                     versionEndExcluding: "17.9.6",
                     versionStartIncluding: "17.9.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código del controlador ODBC de Microsoft para SQL Server",
      },
   ],
   id: "CVE-2024-28934",
   lastModified: "2025-01-14T20:49:24.090",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-04-09T17:15:54.697",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28934",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28934",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-121",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-14 00:15
Modified
2024-11-21 08:02
Summary
.NET and Visual Studio Elevation of Privilege Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FABF6D4-EA23-4234-90D3-0D9306A2994B",
                     versionEndExcluding: "7.0.7",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1F98BC-0D82-4AEB-9E1E-D67325E99385",
                     versionEndExcluding: "17.0.22",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6B0B496-BC41-4F9D-9A28-AE7664B5C77D",
                     versionEndExcluding: "17.2.16",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC861E65-1682-4E99-8A7B-F4A31DDC0198",
                     versionEndExcluding: "17.4.8",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51DB90D6-C1C4-43B9-8B37-696CB361F37F",
                     versionEndExcluding: "17.6.3",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Elevation of Privilege Vulnerability",
      },
   ],
   id: "CVE-2023-32032",
   lastModified: "2024-11-21T08:02:34.300",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1,
            impactScore: 5.5,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-06-14T00:15:11.790",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32032",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32032",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-08-13 18:15
Modified
2024-08-16 19:10
Summary
.NET and Visual Studio Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDD9C1E0-276A-4A51-8950-6F67C00A2FDE",
                     versionEndExcluding: "8.0.8",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B44E6F98-ADC6-4CC9-9DC7-7241AA68A8BC",
                     versionEndExcluding: "17.6.18",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0190B0D7-8EB7-47E7-9889-501A420FD0A4",
                     versionEndExcluding: "17.8.13",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "21986A2A-8166-486E-964D-C4A0CECE9AE2",
                     versionEndExcluding: "17.10.6",
                     versionStartIncluding: "17.10.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de denegación de servicio en .NET y Visual Studio",
      },
   ],
   id: "CVE-2024-38168",
   lastModified: "2024-08-16T19:10:52.113",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-08-13T18:15:24.627",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38168",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-02-14 21:15
Modified
2024-11-21 07:43
Summary
Visual Studio Elevation of Privilege Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "832BAB52-5118-4E00-955D-BF3716B288D0",
                     versionEndExcluding: "15.9.52",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "821BE24D-9EEE-42FE-B4E7-5C682F6B34C4",
                     versionEndExcluding: "16.11.24",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AA616AA-25E5-4943-A614-99FF6DFF260E",
                     versionEndExcluding: "17.0.19",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "191993E5-B343-45A6-B485-F45F5D8E924D",
                     versionEndExcluding: "17.2.13",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F16E4665-E579-4211-92C0-D8058F73A359",
                     versionEndExcluding: "17.4.5",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Elevation of Privilege Vulnerability",
      },
   ],
   id: "CVE-2023-21566",
   lastModified: "2024-11-21T07:43:05.923",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-02-14T21:15:10.847",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21566",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21566",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-73",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-09-12 17:15
Modified
2024-11-21 08:10
Summary
Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EDC4407-7E92-4E60-82F0-0C87D1860D3A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "42A6DF09-B8E1-414D-97E7-453566055279",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "D400E856-2B2E-4CEA-8CA5-309FDF371CEA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "5F422A8C-2C4E-42C8-B420-E0728037E15C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E332666-2E03-468E-BC30-299816D6E8ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F513002-D8C1-4D3A-9F79-4B52498F67E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB4AE761-6FAC-4000-A63D-42CE3FAB8412",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "934D4E46-12C1-41DC-A28C-A2C430E965E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F513002-D8C1-4D3A-9F79-4B52498F67E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB4AE761-6FAC-4000-A63D-42CE3FAB8412",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4793BFB-2E4E-4067-87A5-4B8749025CA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "61019899-D7AF-46E4-A72C-D189180F66AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E332666-2E03-468E-BC30-299816D6E8ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "734112B3-1383-4BE3-8721-C0F84566B764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "36B0E40A-84EF-4099-A395-75D6B8CDA196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "1DE0C8DD-9C73-4876-8193-068F18074B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4E2C6C0-FD91-40D9-B1A4-C1C348A156C7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "482C808D-C0EB-479D-B8A2-D7B04DB4854F",
                     versionEndExcluding: "15.9.57",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "40434953-906B-453E-9F4C-46BF0F693E06",
                     versionEndExcluding: "16.11.30",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7698BEE-8540-4F0C-A500-1393055B88F4",
                     versionEndExcluding: "17.2.19",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8174DBE5-A4BB-4FA6-B921-B2E82B08DAC9",
                     versionEndExcluding: "17.4.11",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8241557-9AD7-42D9-AF07-4C7C1A19AB53",
                     versionEndExcluding: "17.7.4",
                     versionStartIncluding: "17.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de Ejecución Remota de Código de Visual Studio",
      },
   ],
   id: "CVE-2023-36793",
   lastModified: "2024-11-21T08:10:36.400",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-09-12T17:15:14.627",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36793",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36793",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-122",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-10-08 18:15
Modified
2024-10-21 17:35
Summary
.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
Impacted products
Vendor Product Version
microsoft .net_framework 3.5
microsoft .net_framework 4.8.1
microsoft windows_10_21h2 -
microsoft windows_10_22h2 -
microsoft windows_11_22h2 -
microsoft windows_11_23h2 -
microsoft windows_11_24h2 -
microsoft windows_server_2022 *
microsoft windows_server_2022_23h2 *
microsoft .net_framework 3.5
microsoft .net_framework 4.8
microsoft windows_10_1809 *
microsoft windows_10_21h2 *
microsoft windows_10_22h2 *
microsoft windows_11_21h2 *
microsoft windows_server_2019 *
microsoft windows_server_2022 *
microsoft .net_framework 3.5
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft windows_server_2012 *
microsoft windows_server_2012 r2
microsoft .net_framework 4.8
microsoft windows_10_1607 *
microsoft windows_10_1607 *
microsoft windows_server_2008 r2
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft windows_server_2016 *
microsoft .net_framework 3.5
microsoft .net_framework 4.7.2
microsoft windows_10_1809 *
microsoft windows_server_2019 *
microsoft .net_framework 3.5.1
microsoft windows_server_2008 r2
microsoft .net_framework 4.6.2
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft .net_framework 4.6.2
microsoft .net_framework 4.7
microsoft .net_framework 4.7.1
microsoft .net_framework 4.7.2
microsoft windows_server_2008 r2
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft .net_framework 4.6
microsoft .net_framework 4.6.2
microsoft windows_10_1507 -
microsoft .net_framework 3.0
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft .net_framework 2.0
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft .net *
microsoft .net *
apple macos -
linux linux_kernel -
microsoft windows -
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
                     matchCriteriaId: "23317443-1968-4791-9F20-AD3B308A83D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "934D4E46-12C1-41DC-A28C-A2C430E965E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F513002-D8C1-4D3A-9F79-4B52498F67E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4793BFB-2E4E-4067-87A5-4B8749025CA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "42D329B2-432D-4029-87EB-4C3C5F55CD95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_24h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A529CED5-0DF0-4203-85C0-894CAF37E159",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F0241B0-855A-489C-9AAE-68BC2556F24D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B822942-B429-406C-A13A-A2379AA952CF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
                     matchCriteriaId: "23317443-1968-4791-9F20-AD3B308A83D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E2A7014-8078-4C40-91E3-ACA60A98AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "979081E3-FB60-43E0-BF86-ED301E7EF25C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F7487B8-BE4D-4707-9E20-39840A260831",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "47D0AB10-CD2F-4500-A4D6-CC2BA724036C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E4E76DC-838A-46D7-BC09-E2C149699050",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F0241B0-855A-489C-9AAE-68BC2556F24D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
                     matchCriteriaId: "23317443-1968-4791-9F20-AD3B308A83D1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "AA1CCA3D-299D-4BCD-8565-98083C40525C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*",
                     matchCriteriaId: "8968BAC8-A1DB-4F88-89F8-4BE47919C247",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "D00F295B-6ECF-43C4-BD71-98F835CCDB0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1648C361-E25C-42FE-8543-03DE56100201",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF6437F9-6631-49D3-A6C2-62329E278E31",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
                     matchCriteriaId: "23317443-1968-4791-9F20-AD3B308A83D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E2A7014-8078-4C40-91E3-ACA60A98AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E4E76DC-838A-46D7-BC09-E2C149699050",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EDC4407-7E92-4E60-82F0-0C87D1860D3A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "734112B3-1383-4BE3-8721-C0F84566B764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "36B0E40A-84EF-4099-A395-75D6B8CDA196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "280FE663-23BE-45D2-9B31-5F577E390B48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "542DAEEC-73CC-46C6-A630-BF474A3446AC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "D400E856-2B2E-4CEA-8CA5-309FDF371CEA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "42A6DF09-B8E1-414D-97E7-453566055279",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA23E158-EEDE-46D9-ADA2-43A07949A326",
                     versionEndExcluding: "6.0.35",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D977AC32-7583-44F0-B48D-ACB001DA164A",
                     versionEndExcluding: "8.0.10",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8CF89C8-6076-458E-B27E-B88A6A8765FC",
                     versionEndExcluding: "17.6.20",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "81CBEFEE-6C2B-4341-9499-42385C88E5CD",
                     versionEndExcluding: "17.8.15",
                     versionStartIncluding: "17.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "68935496-FE9F-4E64-95C7-4DCAA4681F41",
                     versionEndExcluding: "17.10.8",
                     versionStartIncluding: "17.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FB9AE6A-F671-423C-9C83-0A031067F948",
                     versionEndExcluding: "17.11.5",
                     versionStartIncluding: "17.11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de denegación de servicio en .NET, .NET Framework y Visual Studio",
      },
   ],
   id: "CVE-2024-43483",
   lastModified: "2024-10-21T17:35:34.827",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-10-08T18:15:10.367",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43483",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-407",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-08-08 18:15
Modified
2024-11-21 08:10
Summary
Visual Studio Tools for Office Runtime Spoofing Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
                     matchCriteriaId: "3259EBFE-AE2D-48B8-BE9A-E22BBDB31378",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
                     matchCriteriaId: "CD25F492-9272-4836-832C-8439EBE64CCF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
                     matchCriteriaId: "CF5DDD09-902E-4881-98D0-CB896333B4AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
                     matchCriteriaId: "26A3B226-5D7C-4556-9350-5222DC8EFC2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x64:*",
                     matchCriteriaId: "1AC0C23F-FC55-4DA1-8527-EB4432038FB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x86:*",
                     matchCriteriaId: "A719B461-7869-46D0-9300-D0A348DC26A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2010_tools_for_office_runtime:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D162C421-065E-4A00-B5D0-FB3434A6A12D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0979AC6C-A38A-4B79-9196-D721D066E64B",
                     versionEndExcluding: "15.9.56",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "45EE88D6-0DF3-419E-B434-9039DE073B1A",
                     versionEndExcluding: "16.11.29",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:-:*:*",
                     matchCriteriaId: "E3B42567-B3FF-4101-A639-C2883F567CF2",
                     versionEndExcluding: "17.2.18",
                     versionStartIncluding: "17.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:-:*:*",
                     matchCriteriaId: "4759CA52-CEA4-40C8-B1EF-F161DCFF0E78",
                     versionEndExcluding: "17.4.10",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB465155-CEDD-48E5-8B58-AF49B8FAF504",
                     versionEndExcluding: "17.6.6",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Tools for Office Runtime Spoofing Vulnerability",
      },
   ],
   id: "CVE-2023-36897",
   lastModified: "2024-11-21T08:10:52.130",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 8.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.2,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-08T18:15:15.913",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36897",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36897",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-08-09 20:15
Modified
2024-11-21 07:11
Summary
Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio:2012:update_5:*:*:*:*:*:*",
                     matchCriteriaId: "28CC44DA-DF23-400D-9299-7DF3EECD89E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio:2013:update_5:*:*:*:*:*:*",
                     matchCriteriaId: "4A820094-4660-4CFA-BAF1-ED4DBF45AD46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio:2015:update3:*:*:*:*:*:*",
                     matchCriteriaId: "62FE95C2-066B-491D-82BF-3EF173822B2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:15.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "6290EF90-AB91-4990-8D44-4F64F49AE133",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:16.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF6CF9B0-D279-42CD-A84D-48327F44422D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:16.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "99E7DAC9-17EF-40D4-AEEC-C24970B7190F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3393F97F-05CD-4B04-A6E1-3D914652C4E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB70FC91-06DB-4E92-9C0B-6FDE078F911B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Ejecución de Código Remota en Visual Studio. Este ID de CVE es diferente de CVE-2022-35777, CVE-2022-35826, CVE-2022-35827",
      },
   ],
   id: "CVE-2022-35825",
   lastModified: "2024-11-21T07:11:45.800",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2022-08-09T20:15:15.193",
   references: [
      {
         source: "secure@microsoft.com",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35825",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35825",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-10-10 14:15
Modified
2025-04-12 01:00
Summary
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
References
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/10/10/6Mailing List, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/10/10/7Mailing List, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/10/13/4Mailing List, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/10/13/9Mailing List, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/10/18/4Mailing List, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/10/18/8Mailing List, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/10/19/6Mailing List, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/10/20/8Mailing List, Third Party Advisory
cve@mitre.orghttps://access.redhat.com/security/cve/cve-2023-44487Vendor Advisory
cve@mitre.orghttps://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/Press/Media Coverage, Third Party Advisory
cve@mitre.orghttps://aws.amazon.com/security/security-bulletins/AWS-2023-011/Third Party Advisory
cve@mitre.orghttps://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/Technical Description, Vendor Advisory
cve@mitre.orghttps://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/Third Party Advisory, Vendor Advisory
cve@mitre.orghttps://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/Vendor Advisory
cve@mitre.orghttps://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attackPress/Media Coverage, Third Party Advisory
cve@mitre.orghttps://blog.vespa.ai/cve-2023-44487/Vendor Advisory
cve@mitre.orghttps://bugzilla.proxmox.com/show_bug.cgi?id=4988Issue Tracking, Third Party Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=2242803Issue Tracking, Vendor Advisory
cve@mitre.orghttps://bugzilla.suse.com/show_bug.cgi?id=1216123Issue Tracking, Vendor Advisory
cve@mitre.orghttps://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9Mailing List, Patch, Vendor Advisory
cve@mitre.orghttps://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/Technical Description, Vendor Advisory
cve@mitre.orghttps://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attackTechnical Description, Vendor Advisory
cve@mitre.orghttps://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125Vendor Advisory
cve@mitre.orghttps://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715Third Party Advisory
cve@mitre.orghttps://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cveTechnical Description, Third Party Advisory
cve@mitre.orghttps://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764Vendor Advisory
cve@mitre.orghttps://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088Issue Tracking, Patch
cve@mitre.orghttps://github.com/Azure/AKS/issues/3947Issue Tracking
cve@mitre.orghttps://github.com/Kong/kong/discussions/11741Issue Tracking
cve@mitre.orghttps://github.com/advisories/GHSA-qppj-fm5r-hxr3Vendor Advisory
cve@mitre.orghttps://github.com/advisories/GHSA-vx74-f528-fxqgMitigation, Patch, Vendor Advisory
cve@mitre.orghttps://github.com/advisories/GHSA-xpw8-rcwv-8f8pPatch, Vendor Advisory
cve@mitre.orghttps://github.com/akka/akka-http/issues/4323Issue Tracking
cve@mitre.orghttps://github.com/alibaba/tengine/issues/1872Issue Tracking
cve@mitre.orghttps://github.com/apache/apisix/issues/10320Issue Tracking
cve@mitre.orghttps://github.com/apache/httpd-site/pull/10Issue Tracking
cve@mitre.orghttps://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113Product
cve@mitre.orghttps://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2Product, Third Party Advisory
cve@mitre.orghttps://github.com/apache/trafficserver/pull/10564Issue Tracking, Patch
cve@mitre.orghttps://github.com/arkrwn/PoC/tree/main/CVE-2023-44487Vendor Advisory
cve@mitre.orghttps://github.com/bcdannyboy/CVE-2023-44487Third Party Advisory
cve@mitre.orghttps://github.com/caddyserver/caddy/issues/5877Issue Tracking, Vendor Advisory
cve@mitre.orghttps://github.com/caddyserver/caddy/releases/tag/v2.7.5Release Notes, Third Party Advisory
cve@mitre.orghttps://github.com/dotnet/announcements/issues/277Issue Tracking, Mitigation, Vendor Advisory
cve@mitre.orghttps://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73Product, Release Notes
cve@mitre.orghttps://github.com/eclipse/jetty.project/issues/10679Issue Tracking
cve@mitre.orghttps://github.com/envoyproxy/envoy/pull/30055Issue Tracking, Patch
cve@mitre.orghttps://github.com/etcd-io/etcd/issues/16740Issue Tracking, Patch
cve@mitre.orghttps://github.com/facebook/proxygen/pull/466Issue Tracking, Patch
cve@mitre.orghttps://github.com/golang/go/issues/63417Issue Tracking
cve@mitre.orghttps://github.com/grpc/grpc-go/pull/6703Issue Tracking, Patch
cve@mitre.orghttps://github.com/grpc/grpc/releases/tag/v1.59.2Mailing List
cve@mitre.orghttps://github.com/h2o/h2o/pull/3291Issue Tracking, Patch
cve@mitre.orghttps://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqfVendor Advisory
cve@mitre.orghttps://github.com/haproxy/haproxy/issues/2312Issue Tracking
cve@mitre.orghttps://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244Product
cve@mitre.orghttps://github.com/junkurihara/rust-rpxy/issues/97Issue Tracking
cve@mitre.orghttps://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1Patch
cve@mitre.orghttps://github.com/kazu-yamamoto/http2/issues/93Issue Tracking
cve@mitre.orghttps://github.com/kubernetes/kubernetes/pull/121120Issue Tracking, Patch
cve@mitre.orghttps://github.com/line/armeria/pull/5232Issue Tracking, Patch
cve@mitre.orghttps://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632Patch
cve@mitre.orghttps://github.com/micrictor/http2-rst-streamExploit, Third Party Advisory
cve@mitre.orghttps://github.com/microsoft/CBL-Mariner/pull/6381Issue Tracking, Patch
cve@mitre.orghttps://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61Patch
cve@mitre.orghttps://github.com/nghttp2/nghttp2/pull/1961Issue Tracking, Patch
cve@mitre.orghttps://github.com/nghttp2/nghttp2/releases/tag/v1.57.0Release Notes
cve@mitre.orghttps://github.com/ninenines/cowboy/issues/1615Issue Tracking
cve@mitre.orghttps://github.com/nodejs/node/pull/50121Issue Tracking
cve@mitre.orghttps://github.com/openresty/openresty/issues/930Issue Tracking
cve@mitre.orghttps://github.com/opensearch-project/data-prepper/issues/3474Issue Tracking, Patch
cve@mitre.orghttps://github.com/oqtane/oqtane.framework/discussions/3367Issue Tracking
cve@mitre.orghttps://github.com/projectcontour/contour/pull/5826Issue Tracking, Patch
cve@mitre.orghttps://github.com/tempesta-tech/tempesta/issues/1986Issue Tracking
cve@mitre.orghttps://github.com/varnishcache/varnish-cache/issues/3996Issue Tracking
cve@mitre.orghttps://groups.google.com/g/golang-announce/c/iNNxDTCjZvoMailing List, Release Notes, Vendor Advisory
cve@mitre.orghttps://istio.io/latest/news/security/istio-security-2023-004/Vendor Advisory
cve@mitre.orghttps://linkerd.io/2023/10/12/linkerd-cve-2023-44487/Vendor Advisory
cve@mitre.orghttps://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87qMailing List
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/10/msg00020.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/10/msg00023.htmlMailing List
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/10/msg00024.htmlMailing List
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/10/msg00045.htmlMailing List
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/10/msg00047.htmlMailing List
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/11/msg00001.htmlMailing List
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/11/msg00012.htmlMailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/Mailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/Mailing List
cve@mitre.orghttps://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.htmlMailing List, Patch, Third Party Advisory
cve@mitre.orghttps://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.htmlThird Party Advisory
cve@mitre.orghttps://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/Patch, Vendor Advisory
cve@mitre.orghttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487Mitigation, Patch, Vendor Advisory
cve@mitre.orghttps://my.f5.com/manage/s/article/K000137106Vendor Advisory
cve@mitre.orghttps://netty.io/news/2023/10/10/4-1-100-Final.htmlRelease Notes, Vendor Advisory
cve@mitre.orghttps://news.ycombinator.com/item?id=37830987Issue Tracking
cve@mitre.orghttps://news.ycombinator.com/item?id=37830998Issue Tracking, Press/Media Coverage
cve@mitre.orghttps://news.ycombinator.com/item?id=37831062Issue Tracking
cve@mitre.orghttps://news.ycombinator.com/item?id=37837043Issue Tracking
cve@mitre.orghttps://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/Third Party Advisory
cve@mitre.orghttps://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffectedThird Party Advisory
cve@mitre.orghttps://security.gentoo.org/glsa/202311-09Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20231016-0001/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20240426-0007/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20240621-0006/Exploit, Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20240621-0007/Third Party Advisory
cve@mitre.orghttps://security.paloaltonetworks.com/CVE-2023-44487Vendor Advisory
cve@mitre.orghttps://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14Release Notes
cve@mitre.orghttps://ubuntu.com/security/CVE-2023-44487Vendor Advisory
cve@mitre.orghttps://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/Third Party Advisory
cve@mitre.orghttps://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-eventPress/Media Coverage, Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2023/dsa-5521Mailing List, Vendor Advisory
cve@mitre.orghttps://www.debian.org/security/2023/dsa-5522Mailing List, Vendor Advisory
cve@mitre.orghttps://www.debian.org/security/2023/dsa-5540Mailing List, Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2023/dsa-5549Mailing List, Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2023/dsa-5558Mailing List, Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2023/dsa-5570Third Party Advisory
cve@mitre.orghttps://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487Third Party Advisory, Vendor Advisory
cve@mitre.orghttps://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/Vendor Advisory
cve@mitre.orghttps://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/Mitigation, Vendor Advisory
cve@mitre.orghttps://www.openwall.com/lists/oss-security/2023/10/10/6Mailing List, Third Party Advisory
cve@mitre.orghttps://www.phoronix.com/news/HTTP2-Rapid-Reset-AttackPress/Media Coverage
cve@mitre.orghttps://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/Press/Media Coverage, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/13/4Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/13/9Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/18/4Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/18/8Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/19/6Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/20/8Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/security/cve/cve-2023-44487Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/Press/Media Coverage, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://aws.amazon.com/security/security-bulletins/AWS-2023-011/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/Technical Description, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/Third Party Advisory, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attackPress/Media Coverage, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://blog.vespa.ai/cve-2023-44487/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.proxmox.com/show_bug.cgi?id=4988Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=2242803Issue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.suse.com/show_bug.cgi?id=1216123Issue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9Mailing List, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/Technical Description, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attackTechnical Description, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cveTechnical Description, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/Azure/AKS/issues/3947Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/Kong/kong/discussions/11741Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/advisories/GHSA-qppj-fm5r-hxr3Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/advisories/GHSA-vx74-f528-fxqgMitigation, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/advisories/GHSA-xpw8-rcwv-8f8pPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/akka/akka-http/issues/4323Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/alibaba/tengine/issues/1872Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/apache/apisix/issues/10320Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/apache/httpd-site/pull/10Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113Product
af854a3a-2127-422b-91ae-364da2661108https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2Product, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/apache/trafficserver/pull/10564Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/bcdannyboy/CVE-2023-44487Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/caddyserver/caddy/issues/5877Issue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/caddyserver/caddy/releases/tag/v2.7.5Release Notes, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/dotnet/announcements/issues/277Issue Tracking, Mitigation, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73Product, Release Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/eclipse/jetty.project/issues/10679Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/envoyproxy/envoy/pull/30055Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/etcd-io/etcd/issues/16740Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/facebook/proxygen/pull/466Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/golang/go/issues/63417Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/grpc/grpc-go/pull/6703Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/h2o/h2o/pull/3291Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqfVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/haproxy/haproxy/issues/2312Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244Product
af854a3a-2127-422b-91ae-364da2661108https://github.com/junkurihara/rust-rpxy/issues/97Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/kazu-yamamoto/http2/issues/93Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/kubernetes/kubernetes/pull/121120Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/line/armeria/pull/5232Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/micrictor/http2-rst-streamExploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/microsoft/CBL-Mariner/pull/6381Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/nghttp2/nghttp2/pull/1961Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0Release Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/ninenines/cowboy/issues/1615Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/nodejs/node/pull/50121Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/openresty/openresty/issues/930Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/opensearch-project/data-prepper/issues/3474Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/oqtane/oqtane.framework/discussions/3367Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/projectcontour/contour/pull/5826Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/tempesta-tech/tempesta/issues/1986Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/varnishcache/varnish-cache/issues/3996Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/g/golang-announce/c/iNNxDTCjZvoMailing List, Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://istio.io/latest/news/security/istio-security-2023-004/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87qMailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/10/msg00020.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/10/msg00023.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/10/msg00024.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/10/msg00045.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/10/msg00047.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/11/msg00001.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/11/msg00012.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.htmlMailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487Mitigation, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://my.f5.com/manage/s/article/K000137106Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://netty.io/news/2023/10/10/4-1-100-Final.htmlRelease Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://news.ycombinator.com/item?id=37830987Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://news.ycombinator.com/item?id=37830998Issue Tracking, Press/Media Coverage
af854a3a-2127-422b-91ae-364da2661108https://news.ycombinator.com/item?id=37831062Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://news.ycombinator.com/item?id=37837043Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffectedThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202311-09Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20231016-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20240426-0007/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20240621-0006/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20240621-0007/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.paloaltonetworks.com/CVE-2023-44487Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14Release Notes
af854a3a-2127-422b-91ae-364da2661108https://ubuntu.com/security/CVE-2023-44487Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-eventPress/Media Coverage, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5521Mailing List, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5522Mailing List, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5540Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5549Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5558Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5570Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487Third Party Advisory, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/Mitigation, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.openwall.com/lists/oss-security/2023/10/10/6Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.phoronix.com/news/HTTP2-Rapid-Reset-AttackPress/Media Coverage
af854a3a-2127-422b-91ae-364da2661108https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/Press/Media Coverage, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-causeThird Party Advisory
Impacted products
Vendor Product Version
ietf http 2.0
nghttp2 nghttp2 *
netty netty *
envoyproxy envoy 1.24.10
envoyproxy envoy 1.25.9
envoyproxy envoy 1.26.4
envoyproxy envoy 1.27.0
eclipse jetty *
eclipse jetty *
eclipse jetty *
eclipse jetty *
caddyserver caddy *
golang go *
golang go *
golang http2 *
golang networking *
f5 big-ip_access_policy_manager *
f5 big-ip_access_policy_manager *
f5 big-ip_access_policy_manager *
f5 big-ip_access_policy_manager *
f5 big-ip_access_policy_manager 17.1.0
f5 big-ip_advanced_firewall_manager *
f5 big-ip_advanced_firewall_manager *
f5 big-ip_advanced_firewall_manager *
f5 big-ip_advanced_firewall_manager *
f5 big-ip_advanced_firewall_manager 17.1.0
f5 big-ip_advanced_web_application_firewall *
f5 big-ip_advanced_web_application_firewall *
f5 big-ip_advanced_web_application_firewall *
f5 big-ip_advanced_web_application_firewall *
f5 big-ip_advanced_web_application_firewall 17.1.0
f5 big-ip_analytics *
f5 big-ip_analytics *
f5 big-ip_analytics *
f5 big-ip_analytics *
f5 big-ip_analytics 17.1.0
f5 big-ip_application_acceleration_manager *
f5 big-ip_application_acceleration_manager *
f5 big-ip_application_acceleration_manager *
f5 big-ip_application_acceleration_manager *
f5 big-ip_application_acceleration_manager 17.1.0
f5 big-ip_application_security_manager *
f5 big-ip_application_security_manager *
f5 big-ip_application_security_manager *
f5 big-ip_application_security_manager *
f5 big-ip_application_security_manager 17.1.0
f5 big-ip_application_visibility_and_reporting *
f5 big-ip_application_visibility_and_reporting *
f5 big-ip_application_visibility_and_reporting *
f5 big-ip_application_visibility_and_reporting *
f5 big-ip_application_visibility_and_reporting 17.1.0
f5 big-ip_carrier-grade_nat *
f5 big-ip_carrier-grade_nat *
f5 big-ip_carrier-grade_nat *
f5 big-ip_carrier-grade_nat *
f5 big-ip_carrier-grade_nat 17.1.0
f5 big-ip_ddos_hybrid_defender *
f5 big-ip_ddos_hybrid_defender *
f5 big-ip_ddos_hybrid_defender *
f5 big-ip_ddos_hybrid_defender *
f5 big-ip_ddos_hybrid_defender 17.1.0
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system 17.1.0
f5 big-ip_fraud_protection_service *
f5 big-ip_fraud_protection_service *
f5 big-ip_fraud_protection_service *
f5 big-ip_fraud_protection_service *
f5 big-ip_fraud_protection_service 17.1.0
f5 big-ip_global_traffic_manager *
f5 big-ip_global_traffic_manager *
f5 big-ip_global_traffic_manager *
f5 big-ip_global_traffic_manager *
f5 big-ip_global_traffic_manager 17.1.0
f5 big-ip_link_controller *
f5 big-ip_link_controller *
f5 big-ip_link_controller *
f5 big-ip_link_controller *
f5 big-ip_link_controller 17.1.0
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager 17.1.0
f5 big-ip_next 20.0.1
f5 big-ip_next_service_proxy_for_kubernetes *
f5 big-ip_policy_enforcement_manager *
f5 big-ip_policy_enforcement_manager *
f5 big-ip_policy_enforcement_manager *
f5 big-ip_policy_enforcement_manager *
f5 big-ip_policy_enforcement_manager 17.1.0
f5 big-ip_ssl_orchestrator *
f5 big-ip_ssl_orchestrator *
f5 big-ip_ssl_orchestrator *
f5 big-ip_ssl_orchestrator *
f5 big-ip_ssl_orchestrator 17.1.0
f5 big-ip_webaccelerator *
f5 big-ip_webaccelerator *
f5 big-ip_webaccelerator *
f5 big-ip_webaccelerator *
f5 big-ip_webaccelerator 17.1.0
f5 big-ip_websafe *
f5 big-ip_websafe *
f5 big-ip_websafe *
f5 big-ip_websafe *
f5 big-ip_websafe 17.1.0
f5 nginx *
f5 nginx_ingress_controller *
f5 nginx_ingress_controller *
f5 nginx_plus *
f5 nginx_plus r29
f5 nginx_plus r30
apache tomcat *
apache tomcat *
apache tomcat *
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apple swiftnio_http\/2 *
grpc grpc *
grpc grpc *
grpc grpc *
grpc grpc 1.57.0
microsoft .net *
microsoft .net *
microsoft asp.net_core *
microsoft asp.net_core *
microsoft azure_kubernetes_service *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft windows_10_1607 *
microsoft windows_10_1607 *
microsoft windows_10_1809 *
microsoft windows_10_21h2 *
microsoft windows_10_22h2 *
microsoft windows_11_21h2 *
microsoft windows_11_22h2 *
microsoft windows_server_2016 -
microsoft windows_server_2019 -
microsoft windows_server_2022 -
nodejs node.js *
nodejs node.js *
microsoft cbl-mariner *
dena h2o *
facebook proxygen *
apache apisix *
apache traffic_server *
apache traffic_server *
amazon opensearch_data_prepper *
debian debian_linux 10.0
debian debian_linux 11.0
debian debian_linux 12.0
kazu-yamamoto http2 *
istio istio *
istio istio *
istio istio *
varnish_cache_project varnish_cache *
traefik traefik *
traefik traefik 3.0.0
traefik traefik 3.0.0
traefik traefik 3.0.0
projectcontour contour *
linkerd linkerd *
linkerd linkerd 2.13.0
linkerd linkerd 2.13.1
linkerd linkerd 2.14.0
linkerd linkerd 2.14.1
linecorp armeria *
redhat 3scale_api_management_platform 2.0
redhat advanced_cluster_management_for_kubernetes 2.0
redhat advanced_cluster_security 3.0
redhat advanced_cluster_security 4.0
redhat ansible_automation_platform 2.0
redhat build_of_optaplanner 8.0
redhat build_of_quarkus -
redhat ceph_storage 5.0
redhat cert-manager_operator_for_red_hat_openshift -
redhat certification_for_red_hat_enterprise_linux 8.0
redhat certification_for_red_hat_enterprise_linux 9.0
redhat cost_management -
redhat cryostat 2.0
redhat decision_manager 7.0
redhat fence_agents_remediation_operator -
redhat integration_camel_for_spring_boot -
redhat integration_camel_k -
redhat integration_service_registry -
redhat jboss_a-mq 7
redhat jboss_a-mq_streams -
redhat jboss_core_services -
redhat jboss_data_grid 7.0.0
redhat jboss_enterprise_application_platform 6.0.0
redhat jboss_enterprise_application_platform 7.0.0
redhat jboss_fuse 6.0.0
redhat jboss_fuse 7.0.0
redhat logging_subsystem_for_red_hat_openshift -
redhat machine_deletion_remediation_operator -
redhat migration_toolkit_for_applications 6.0
redhat migration_toolkit_for_containers -
redhat migration_toolkit_for_virtualization -
redhat network_observability_operator -
redhat node_healthcheck_operator -
redhat node_maintenance_operator -
redhat openshift -
redhat openshift_api_for_data_protection -
redhat openshift_container_platform 4.0
redhat openshift_container_platform_assisted_installer -
redhat openshift_data_science -
redhat openshift_dev_spaces -
redhat openshift_developer_tools_and_services -
redhat openshift_distributed_tracing -
redhat openshift_gitops -
redhat openshift_pipelines -
redhat openshift_sandboxed_containers -
redhat openshift_secondary_scheduler_operator -
redhat openshift_serverless -
redhat openshift_service_mesh 2.0
redhat openshift_virtualization 4
redhat openstack_platform 16.1
redhat openstack_platform 16.2
redhat openstack_platform 17.1
redhat process_automation 7.0
redhat quay 3.0.0
redhat run_once_duration_override_operator -
redhat satellite 6.0
redhat self_node_remediation_operator -
redhat service_interconnect 1.0
redhat single_sign-on 7.0
redhat support_for_spring_boot -
redhat web_terminal -
redhat enterprise_linux 6.0
redhat enterprise_linux 8.0
redhat enterprise_linux 9.0
redhat service_telemetry_framework 1.5
redhat enterprise_linux 8.0
fedoraproject fedora 37
fedoraproject fedora 38
netapp astra_control_center -
netapp oncommand_insight -
akka http_server *
konghq kong_gateway *
jenkins jenkins *
jenkins jenkins *
apache solr *
openresty openresty *
cisco connected_mobile_experiences *
cisco crosswork_data_gateway *
cisco crosswork_data_gateway 5.0
cisco crosswork_zero_touch_provisioning *
cisco data_center_network_manager -
cisco enterprise_chat_and_email -
cisco expressway *
cisco firepower_threat_defense *
cisco iot_field_network_director *
cisco prime_access_registrar *
cisco prime_cable_provisioning *
cisco prime_infrastructure *
cisco prime_network_registrar *
cisco secure_dynamic_attributes_connector *
cisco secure_malware_analytics *
cisco telepresence_video_communication_server *
cisco ultra_cloud_core_-_policy_control_function *
cisco ultra_cloud_core_-_policy_control_function 2024.01.0
cisco ultra_cloud_core_-_serving_gateway_function *
cisco ultra_cloud_core_-_session_management_function *
cisco unified_attendant_console_advanced -
cisco unified_contact_center_domain_manager -
cisco unified_contact_center_enterprise -
cisco unified_contact_center_enterprise_-_live_data_server *
cisco unified_contact_center_management_portal -
cisco fog_director *
cisco ios_xe *
cisco ios_xr *
cisco secure_web_appliance_firmware *
cisco secure_web_appliance -
cisco nx-os *
cisco nx-os *
cisco nexus_3016 -
cisco nexus_3016q -
cisco nexus_3048 -
cisco nexus_3064 -
cisco nexus_3064-32t -
cisco nexus_3064-t -
cisco nexus_3064-x -
cisco nexus_3064t -
cisco nexus_3064x -
cisco nexus_3100 -
cisco nexus_3100-v -
cisco nexus_3100-z -
cisco nexus_3100v -
cisco nexus_31108pc-v -
cisco nexus_31108pv-v -
cisco nexus_31108tc-v -
cisco nexus_31128pq -
cisco nexus_3132c-z -
cisco nexus_3132q -
cisco nexus_3132q-v -
cisco nexus_3132q-x -
cisco nexus_3132q-x\/3132q-xl -
cisco nexus_3132q-xl -
cisco nexus_3164q -
cisco nexus_3172 -
cisco nexus_3172pq -
cisco nexus_3172pq-xl -
cisco nexus_3172pq\/pq-xl -
cisco nexus_3172tq -
cisco nexus_3172tq-32t -
cisco nexus_3172tq-xl -
cisco nexus_3200 -
cisco nexus_3232 -
cisco nexus_3232c -
cisco nexus_3232c_ -
cisco nexus_3264c-e -
cisco nexus_3264q -
cisco nexus_3400 -
cisco nexus_3408-s -
cisco nexus_34180yc -
cisco nexus_34200yc-sm -
cisco nexus_3432d-s -
cisco nexus_3464c -
cisco nexus_3500 -
cisco nexus_3524 -
cisco nexus_3524-x -
cisco nexus_3524-x\/xl -
cisco nexus_3524-xl -
cisco nexus_3548 -
cisco nexus_3548-x -
cisco nexus_3548-x\/xl -
cisco nexus_3548-xl -
cisco nexus_3600 -
cisco nexus_36180yc-r -
cisco nexus_3636c-r -
cisco nx-os *
cisco nx-os *
cisco nexus_9000v -
cisco nexus_9200 -
cisco nexus_9200yc -
cisco nexus_92160yc-x -
cisco nexus_92160yc_switch -
cisco nexus_9221c -
cisco nexus_92300yc -
cisco nexus_92300yc_switch -
cisco nexus_92304qc -
cisco nexus_92304qc_switch -
cisco nexus_9232e -
cisco nexus_92348gc-x -
cisco nexus_9236c -
cisco nexus_9236c_switch -
cisco nexus_9272q -
cisco nexus_9272q_switch -
cisco nexus_9300 -
cisco nexus_93108tc-ex -
cisco nexus_93108tc-ex-24 -
cisco nexus_93108tc-ex_switch -
cisco nexus_93108tc-fx -
cisco nexus_93108tc-fx-24 -
cisco nexus_93108tc-fx3h -
cisco nexus_93108tc-fx3p -
cisco nexus_93120tx -
cisco nexus_93120tx_switch -
cisco nexus_93128 -
cisco nexus_93128tx -
cisco nexus_93128tx_switch -
cisco nexus_9316d-gx -
cisco nexus_93180lc-ex -
cisco nexus_93180lc-ex_switch -
cisco nexus_93180tc-ex -
cisco nexus_93180yc-ex -
cisco nexus_93180yc-ex-24 -
cisco nexus_93180yc-ex_switch -
cisco nexus_93180yc-fx -
cisco nexus_93180yc-fx-24 -
cisco nexus_93180yc-fx3 -
cisco nexus_93180yc-fx3h -
cisco nexus_93180yc-fx3s -
cisco nexus_93216tc-fx2 -
cisco nexus_93240tc-fx2 -
cisco nexus_93240yc-fx2 -
cisco nexus_9332c -
cisco nexus_9332d-gx2b -
cisco nexus_9332d-h2r -
cisco nexus_9332pq -
cisco nexus_9332pq_switch -
cisco nexus_93360yc-fx2 -
cisco nexus_9336c-fx2 -
cisco nexus_9336c-fx2-e -
cisco nexus_9336pq -
cisco nexus_9336pq_aci -
cisco nexus_9336pq_aci_spine -
cisco nexus_9336pq_aci_spine_switch -
cisco nexus_9348d-gx2a -
cisco nexus_9348gc-fx3 -
cisco nexus_9348gc-fxp -
cisco nexus_93600cd-gx -
cisco nexus_9364c -
cisco nexus_9364c-gx -
cisco nexus_9364d-gx2a -
cisco nexus_9372px -
cisco nexus_9372px-e -
cisco nexus_9372px-e_switch -
cisco nexus_9372px_switch -
cisco nexus_9372tx -
cisco nexus_9372tx-e -
cisco nexus_9372tx-e_switch -
cisco nexus_9372tx_switch -
cisco nexus_9396px -
cisco nexus_9396px_switch -
cisco nexus_9396tx -
cisco nexus_9396tx_switch -
cisco nexus_9408 -
cisco nexus_9432pq -
cisco nexus_9500 -
cisco nexus_9500_16-slot -
cisco nexus_9500_4-slot -
cisco nexus_9500_8-slot -
cisco nexus_9500_supervisor_a -
cisco nexus_9500_supervisor_a\+ -
cisco nexus_9500_supervisor_b -
cisco nexus_9500_supervisor_b\+ -
cisco nexus_9500r -
cisco nexus_9504 -
cisco nexus_9504_switch -
cisco nexus_9508 -
cisco nexus_9508_switch -
cisco nexus_9516 -
cisco nexus_9516_switch -
cisco nexus_9536pq -
cisco nexus_9636pq -
cisco nexus_9716d-gx -
cisco nexus_9736pq -
cisco nexus_9800 -
cisco nexus_9804 -
cisco nexus_9808 -



{
   cisaActionDue: "2023-10-31",
   cisaExploitAdd: "2023-10-10",
   cisaRequiredAction: "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
   cisaVulnerabilityName: "HTTP/2 Rapid Reset Attack Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5200E35-222B-42E0-83E0-5B702684D992",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3BDC297-F023-4E87-8518-B84CCF9DD6A8",
                     versionEndExcluding: "1.57.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D12D5257-7ED2-400F-9EF7-40E0D3650C2B",
                     versionEndExcluding: "4.1.100",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:envoyproxy:envoy:1.24.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B058776-B5B7-4079-B0AF-23F40926DCEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:envoyproxy:envoy:1.25.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D565975-EFD9-467C-B6E3-1866A4EF17A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:envoyproxy:envoy:1.26.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D487271-1B5E-4F16-B0CB-A7B8908935C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:envoyproxy:envoy:1.27.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA6ED627-EFB3-4BDD-8ECC-C5947A1470B2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4A6F189-6C43-462D-85C9-B0EBDA8A4683",
                     versionEndExcluding: "9.4.53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C993C920-85C0-4181-A95E-5D965A670738",
                     versionEndExcluding: "10.0.17",
                     versionStartIncluding: "10.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08E79A8E-E12C-498F-AF4F-1AAA7135661E",
                     versionEndExcluding: "11.0.17",
                     versionStartIncluding: "11.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F138D800-9A3B-4C76-8A3C-4793083A1517",
                     versionEndExcluding: "12.0.2",
                     versionStartIncluding: "12.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:caddyserver:caddy:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6341DDDA-AD27-4087-9D59-0A212F0037B4",
                     versionEndExcluding: "2.7.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "328120E4-C031-44B4-9BE5-03B0CDAA066F",
                     versionEndExcluding: "1.20.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FD9AB15-E5F6-4DBC-9EC7-D0ABA705802A",
                     versionEndExcluding: "1.21.3",
                     versionStartIncluding: "1.21.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*",
                     matchCriteriaId: "D7D2F801-6F65-4705-BCB9-D057EA54A707",
                     versionEndExcluding: "0.17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:golang:networking:*:*:*:*:*:go:*:*",
                     matchCriteriaId: "801F25DA-F38C-4452-8E90-235A3B1A5FF0",
                     versionEndExcluding: "0.17.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D93F04AD-DF14-48AB-9F13-8B2E491CF42E",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7522C760-7E07-406F-BF50-5656D5723C4F",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A7F605E-EB10-40FB-98D6-7E3A95E310BC",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "783E62F2-F867-48F1-B123-D1227C970674",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8D90B7-A1AF-4EFB-B688-1563D81E5C6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6603ED6A-3366-4572-AFCD-B3D4B1EC7606",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "88978E38-81D3-4EFE-8525-A300B101FA69",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0510296F-92D7-4388-AE3A-0D9799C2FC4D",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7698D6C-B1F7-43C1-BBA6-88E956356B3D",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A1CC91B-6920-4AF0-9EDD-DD3189E78F4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "05E452AA-A520-4CBE-8767-147772B69194",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "596FC5D5-7329-4E39-841E-CAE937C02219",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3C7A168-F370-441E-8790-73014BCEC39F",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF16FD01-7704-40AB-ACB2-80A883804D22",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1769D69A-CB59-46B1-89B3-FB97DC6DEB9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9167FEC1-2C37-4946-9657-B4E69301FB24",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B4B3442-E0C0-48CD-87AD-060E15C9801E",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FA85EC1-D91A-49DD-949B-2AF7AC813CA5",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "20662BB0-4C3D-4CF0-B068-3555C65DD06C",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "59203EBF-C52A-45A1-B8DF-00E17E3EFB51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7EC2324D-EC8B-41DF-88A7-819E53AAD0FC",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B88F9D1-B54B-40C7-A18A-26C4A071D7EC",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8F39403-C259-4D6F-9E9A-53671017EEDB",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "220F2D38-FA82-45EF-B957-7678C9FEDBC1",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C698C1C-A3DD-46E2-B05A-12F2604E7F85",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "922AA845-530A-4B4B-9976-4CBC30C8A324",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F938EB43-8373-47EB-B269-C6DF058A9244",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1771493E-ACAA-477F-8AB4-25DB12F6AD6E",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E86F3D5-65A4-48CE-A6A2-736BBB88E3F8",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "87670A74-34FE-45DF-A725-25B804C845B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7E422F6-C4C2-43AC-B137-0997B5739030",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC3F710F-DBCB-4976-9719-CF063DA22377",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B9B76A1-7C5A-453F-A4ED-F1A81BCEBEB5",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "88EDFCD9-775C-48FA-9CDA-2B04DA8D0612",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "67DB21AE-DF53-442D-B492-C4ED9A20B105",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C9FCBCB-9CE0-49E7-85C8-69E71D211912",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "112DFA85-90AD-478D-BD70-8C7C0C074F1B",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB704A1C-D8B7-48BB-A15A-C14DB591FE4A",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "21D51D9F-2840-4DEA-A007-D20111A1745C",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC1D037-74D2-4F92-89AD-C90F6CBF440B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAEF3EA4-7D5A-4B44-9CE3-258AEC745866",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FBCE2D1-9D93-415D-AB2C-2060307C305A",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8070B469-8CC4-4D2F-97D7-12D0ABB963C1",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A326597E-725D-45DE-BEF7-2ED92137B253",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B235A78-649B-46C5-B24B-AB485A884654",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08B25AAB-A98C-4F89-9131-29E3A8C0ED23",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED9B976A-D3AD-4445-BF8A-067C3EBDFBB0",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "98D2CE1E-DED0-470A-AA78-C78EF769C38E",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C966FABA-7199-4F0D-AB8C-4590FE9D2FFF",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "84D00768-E71B-4FF7-A7BF-F2C8CFBC900D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3D2ABA3-D4A9-4267-B0DF-7C3BBEEAEB66",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC36311E-BB00-4750-85C8-51F5A2604F07",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A65D357E-4B40-42EC-9AAA-2B6CEF78C401",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7EF9865-FE65-4DFB-BF21-62FBCE65FF1C",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABBD10E8-6054-408F-9687-B9BF6375CA09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6018B01-048C-43BB-A78D-66910ED60CA9",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A6A5686-5A8B-45D5-9165-BC99D2CCAC47",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D2A121F-5BD2-4263-8ED3-1DDE25B5C306",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A4F7BAD-3EDD-4DE0-AAB7-DE5ACA34DD79",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "83794B04-87E2-4CA9-81F5-BB820D0F5395",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9EC2237-117F-43BD-ADEC-516CF72E04EF",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F70D4B6F-65CF-48F4-9A07-072DFBCE53D9",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "29563719-1AF2-4BB8-8CCA-A0869F87795D",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D24815DD-579A-46D1-B9F2-3BB2C56BC54D",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A6E7035-3299-474F-8F67-945EA9A059D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0360F76D-E75E-4B05-A294-B47012323ED9",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A4607BF-41AC-4E84-A110-74E085FF0445",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "441CC945-7CA3-49C0-AE10-94725301E31D",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "46BA8E8A-6ED5-4FB2-8BBC-586AA031085A",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "56FB92F7-FF1E-425D-A5AB-9D9FB0BB9450",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "969C4F14-F6D6-46D6-B348-FC1463877680",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "41AD5040-1250-45F5-AB63-63F333D49BCC",
                     versionEndIncluding: "1.8.2",
                     versionStartIncluding: "1.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8257AA59-C14D-4EC1-B22C-DFBB92CBC297",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "37DB32BB-F4BA-4FB5-94B1-55C3F06749CF",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFF5007E-761C-4697-8D34-C064DF0ABE8D",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "910441D3-90EF-4375-B007-D51120A60AB2",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "667EB77B-DA13-4BA4-9371-EE3F3A109F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A6F9699-A485-4614-8F38-5A556D31617E",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A90F547-97A2-41EC-9FDF-25F869F0FA38",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E76E1B82-F1DC-4366-B388-DBDF16C586A0",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "660137F4-15A1-42D1-BBAC-99A1D5BB398B",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C446827A-1F71-4FAD-9422-580642D26AD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1932D32D-0E4B-4BBD-816F-6D47AB2E2F04",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D47B7691-A95B-45C0-BAB4-27E047F3C379",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD1637D-0E42-4928-867A-BA0FDB6E8462",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A599F90-F66B-4DF0-AD7D-D234F328BD59",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D1B2000-C3FE-4B4C-885A-A5076EB164E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5326759A-AFB0-4A15-B4E9-3C9A2E5DB32A",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "57D92D05-C67D-437E-88F3-DCC3F6B0ED2F",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECCB8C30-861E-4E48-A5F5-30EE523C1FB6",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5FEAD2A-3A58-432E-BEBB-6E3FDE24395F",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AB23AE6-245E-43D6-B832-933F8259F937",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1188B4A9-2684-413C-83D1-E91C75AE0FCF",
                     versionEndIncluding: "1.25.2",
                     versionStartIncluding: "1.9.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3337609D-5291-4A52-BC6A-6A8D4E60EB20",
                     versionEndIncluding: "2.4.2",
                     versionStartIncluding: "2.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CF0ABD9-EB28-4966-8C31-EED7AFBF1527",
                     versionEndIncluding: "3.3.0",
                     versionStartIncluding: "3.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F291CB34-47A4-425A-A200-087CC295AEC8",
                     versionEndExcluding: "r29",
                     versionStartIncluding: "r25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
                     matchCriteriaId: "5892B558-EC3A-43FF-A1D5-B2D9F70796F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
                     matchCriteriaId: "96BF2B19-52C7-4051-BA58-CAE6F912B72F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABD26B48-CC80-4FAE-BD3D-78DE4C80C92B",
                     versionEndIncluding: "8.5.93",
                     versionStartIncluding: "8.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3EC20B6-B2AB-41F5-9BF9-D16C1FE67C34",
                     versionEndIncluding: "9.0.80",
                     versionStartIncluding: "9.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0765CC3D-AB1A-4147-8900-EF4C105321F2",
                     versionEndIncluding: "10.1.13",
                     versionStartIncluding: "10.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:*",
                     matchCriteriaId: "D1AA7FF6-E8E7-4BF6-983E-0A99B0183008",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*",
                     matchCriteriaId: "57088BDD-A136-45EF-A8A1-2EBF79CEC2CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*",
                     matchCriteriaId: "B32D1D7A-A04F-444E-8F45-BB9A9E4B0199",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*",
                     matchCriteriaId: "2AAD52CE-94F5-4F98-A027-9A7E68818CB6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*",
                     matchCriteriaId: "F1F981F5-035A-4EDD-8A9F-481EE8BC7FF7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*",
                     matchCriteriaId: "03A171AF-2EC8-4422-912C-547CDB58CAAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*",
                     matchCriteriaId: "538E68C4-0BA4-495F-AEF8-4EF6EE7963CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*",
                     matchCriteriaId: "49350A6E-5E1D-45B2-A874-3B8601B3ADCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*",
                     matchCriteriaId: "5F50942F-DF54-46C0-8371-9A476DD3EEA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*",
                     matchCriteriaId: "D12C2C95-B79F-4AA4-8CE3-99A3EE7991AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*",
                     matchCriteriaId: "98792138-DD56-42DF-9612-3BDC65EEC117",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apple:swiftnio_http\\/2:*:*:*:*:*:swift:*:*",
                     matchCriteriaId: "08190072-3880-4EF5-B642-BA053090D95B",
                     versionEndExcluding: "1.28.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*",
                     matchCriteriaId: "5F4CDEA9-CB47-4881-B096-DA896E2364F3",
                     versionEndExcluding: "1.56.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:grpc:grpc:*:*:*:*:*:-:*:*",
                     matchCriteriaId: "E65AF7BC-7DAE-408A-8485-FBED22815F75",
                     versionEndIncluding: "1.59.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*",
                     matchCriteriaId: "DD868DDF-C889-4F36-B5E6-68B6D9EA48CC",
                     versionEndExcluding: "1.58.3",
                     versionStartIncluding: "1.58.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:grpc:grpc:1.57.0:-:*:*:*:go:*:*",
                     matchCriteriaId: "FBD991E2-DB5A-4AAD-95BA-4B5ACB811C96",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4496821E-BD55-4F31-AD9C-A3D66CBBD6BD",
                     versionEndExcluding: "6.0.23",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DF7ECF6-178D-433C-AA21-BAE9EF248F37",
                     versionEndExcluding: "7.0.12",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C3418F4-B8BF-4666-BB39-C188AB01F45C",
                     versionEndExcluding: "6.0.23",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1278DD1C-EFA9-4316-AD32-24C1B1FB0CEA",
                     versionEndExcluding: "7.0.12",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BDFB0FF-0F4A-4B7B-94E8-ED72A8106314",
                     versionEndExcluding: "2023-10-08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "16A8F269-E07E-402F-BFD5-60F3988A5EAF",
                     versionEndExcluding: "17.2.20",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4B2B972-69E2-4D21-9A7C-B2AFF1D89EB8",
                     versionEndExcluding: "17.4.12",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA5834D4-F52F-41C0-AA11-C974FFEEA063",
                     versionEndExcluding: "17.6.8",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2166106F-ACD6-4C7B-B0CC-977B83CC5F73",
                     versionEndExcluding: "17.7.5",
                     versionStartIncluding: "17.7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "4CD49C41-6D90-47D3-AB4F-4A74169D3A8F",
                     versionEndExcluding: "10.0.14393.6351",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "BAEFEE13-9CD7-46A2-8AF6-0A33C79C05F1",
                     versionEndExcluding: "10.0.14393.6351",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E500D59C-6597-45E9-A57B-BE26C0C231D3",
                     versionEndExcluding: "10.0.17763.4974",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9F9A643-90C6-489C-98A0-D2739CE72F86",
                     versionEndExcluding: "10.0.19044.3570",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1814619C-ED07-49E0-A50A-E28D824D43BC",
                     versionEndExcluding: "10.0.19045.3570",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "100A27D3-87B0-4E72-83F6-7605E3F35E63",
                     versionEndExcluding: "10.0.22000.2538",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6A36795-0238-45C9-ABE6-3DCCF751915B",
                     versionEndExcluding: "10.0.22621.2428",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
                     matchCriteriaId: "C61F0294-5C7E-4DB2-8905-B85D0782F35F",
                     versionEndExcluding: "18.18.2",
                     versionStartIncluding: "18.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "69843DE4-4721-4F0A-A9B7-0F6DF5AAA388",
                     versionEndExcluding: "20.8.1",
                     versionStartIncluding: "20.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:cbl-mariner:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B25279EF-C406-4133-99ED-0492703E0A4E",
                     versionEndExcluding: "2023-10-11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FFFF84B-F35C-43DE-959A-A5D10C3AE9F5",
                     versionEndExcluding: "2023-10-10",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:proxygen:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DCE8C89-7C22-48CA-AF22-B34C8AA2CB8C",
                     versionEndExcluding: "2023.10.16.00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDEB508E-0EBD-4450-9074-983DDF568AB4",
                     versionEndExcluding: "3.6.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "93A1A748-6C71-4191-8A16-A93E94E2CDE4",
                     versionEndExcluding: "8.1.9",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E4BCAF6-B246-41EC-9EE1-24296BFC4F5A",
                     versionEndExcluding: "9.2.3",
                     versionStartIncluding: "9.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amazon:opensearch_data_prepper:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F70360D-6214-46BA-AF82-6AB01E13E4E9",
                     versionEndExcluding: "2.5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "46D69DCC-AE4D-4EA5-861C-D60951444C6C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:kazu-yamamoto:http2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2DA759E-1AF8-49D3-A3FC-1B426C13CA82",
                     versionEndExcluding: "4.2.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "28BE6F7B-AE66-4C8A-AAFA-F1262671E9BF",
                     versionEndExcluding: "1.17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0C8E760-C8D2-483A-BBD4-6A6D292A3874",
                     versionEndExcluding: "1.18.3",
                     versionStartIncluding: "1.18.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D0F78BB-6A05-4C97-A8DB-E731B6CC8CC7",
                     versionEndExcluding: "1.19.1",
                     versionStartIncluding: "1.19.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "050AE218-3871-44D6-94DA-12D84C2093CB",
                     versionEndExcluding: "2023-10-10",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B36BFFB0-C0EC-4926-A1DB-0B711C846A68",
                     versionEndExcluding: "2.10.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:traefik:traefik:3.0.0:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "376EAF9B-E994-4268-9704-0A45EA30270F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:traefik:traefik:3.0.0:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "F3D08335-C291-4623-B80C-3B14C4D1FA32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:traefik:traefik:3.0.0:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "21033CEE-CEF5-4B0D-A565-4A6FC764AA6D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:projectcontour:contour:*:*:*:*:*:kubernetes:*:*",
                     matchCriteriaId: "FC4C66B1-42C0-495D-AE63-2889DE0BED84",
                     versionEndExcluding: "2023-10-11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linkerd:linkerd:*:*:*:*:stable:kubernetes:*:*",
                     matchCriteriaId: "8633E263-F066-4DD8-A734-90207207A873",
                     versionEndIncluding: "2.12.5",
                     versionStartIncluding: "2.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linkerd:linkerd:2.13.0:*:*:*:stable:kubernetes:*:*",
                     matchCriteriaId: "34A23BD9-A0F4-4D85-8011-EAC93C29B4E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linkerd:linkerd:2.13.1:*:*:*:stable:kubernetes:*:*",
                     matchCriteriaId: "27ED3533-A795-422F-B923-68BE071DC00D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linkerd:linkerd:2.14.0:*:*:*:stable:kubernetes:*:*",
                     matchCriteriaId: "45F7E352-3208-4188-A5B1-906E00DF9896",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linkerd:linkerd:2.14.1:*:*:*:stable:kubernetes:*:*",
                     matchCriteriaId: "DF89A8AD-66FE-439A-B732-CAAB304D765B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linecorp:armeria:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A400C637-AF18-4BEE-B57C-145261B65DEC",
                     versionEndExcluding: "1.26.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "653A5B08-0D02-4362-A8B1-D00B24C6C6F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B0E6B4B-BAA6-474E-A18C-72C9719CEC1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0FD736A-8730-446A-BA3A-7B608DB62B0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4C504B6-3902-46E2-82B7-48AEC9CDD48D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B4BE2D6-43C3-4065-A213-5DB1325DC78F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D54F5AE-61EC-4434-9D5F-9394A3979894",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE29B9D6-63DC-4779-ACE8-4E51E6A0AF37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E37E1B3-6F68-4502-85D6-68333643BDFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D5A7736-A403-4617-8790-18E46CB74DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "33F13B03-69BF-4A8B-A0A0-7F47FD857461",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9393119E-F018-463F-9548-60436F104195",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC45EE1E-2365-42D4-9D55-92FA24E5ED3A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E567CD9F-5A43-4D25-B911-B5D0440698F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "68146098-58F8-417E-B165-5182527117C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB4D6790-63E5-4043-B8BE-B489D649061D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78698F40-0777-4990-822D-02E1B5D0E2C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B87C8AD3-8878-4546-86C2-BF411876648C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF03BDE8-602D-4DEE-BA5B-5B20FDF47741",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58966CB-36AF-4E64-AB39-BE3A0753E155",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "585BC540-073B-425B-B664-5EA4C00AFED6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B453CF7-9AA6-4B94-A003-BF7AE0B82F53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD354E32-A8B0-484C-B4C6-9FBCD3430D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B142ACCC-F7A9-4A3B-BE60-0D6691D5058D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "72A54BDA-311C-413B-8E4D-388AD65A170A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A305F012-544E-4245-9D69-1C8CD37748B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B40CCE4F-EA2C-453D-BB76-6388767E5C6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF93A27E-AA2B-4C2E-9B8D-FE7267847326",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B12A3A8-6456-481A-A0C9-524543FCC149",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C2E7E3C-A507-4AB2-97E5-4944D8775CF7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E22EBF9-AA0D-4712-9D69-DD97679CE835",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "941B114C-FBD7-42FF-B1D8-4EA30E99102C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "339CFB34-A795-49F9-BF6D-A00F3A1A4F63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D044DBE-6F5A-4C53-828E-7B1A570CACFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E23FA47F-B967-44AD-AB76-1BB2CAD3CA5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
                     matchCriteriaId: "65203CA1-5225-4E55-A187-6454C091F532",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BF8EFFB-5686-4F28-A68F-1A8854E098CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "932D137F-528B-4526-9A89-CD59FA1AB0FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DA9B2E2-958B-478D-87D6-E5CDDCD44315",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3F5FF1E-5DA3-4EC3-B41A-A362BDFC4C69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "99B8A88B-0B31-4CFF-AFD7-C9D3DDD5790D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97321212-0E07-4CC2-A917-7B5F61AB9A5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF390236-3259-4C8F-891C-62ACC4386CD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0AAA300-691A-4957-8B69-F6888CC971B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45937289-2D64-47CB-A750-5B4F0D4664A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B129311C-EB4B-4041-B85C-44D5E53FCAA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1AB54DB-3FB4-41CB-88ED-1400FD22AB85",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77675CB7-67D7-44E9-B7FF-D224B3341AA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A76A2BCE-4AAE-46D7-93D6-2EDE0FC83145",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C877879-B84B-471C-80CF-0656521CA8AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCC81071-B46D-4F5D-AC25-B4A4CCC20C73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3000D2-35DF-4A93-9FC0-1AD3AB8349B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E315FC5C-FF19-43C9-A58A-CF2A5FF13824",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "20A6B40D-F991-4712-8E30-5FE008505CB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1987BDA-0113-4603-B9BE-76647EB043F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D482A3D2-6E9B-42BA-9926-35E5BDD5F3BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "848C92A9-0677-442B-8D52-A448F2019903",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F564701-EDC1-43CF-BB9F-287D6992C6CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "12B0CF2B-D1E1-4E20-846E-6F0D873499A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EFEC7CA-8DDA-48A6-A7B6-1F1D14792890",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8885C2C-7FB8-40CA-BCB9-B48C50BF2499",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D88B140-D2A1-4A0A-A2E9-1A3B50C295AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4CFF558-3C47-480D-A2F0-BABF26042943",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:redhat:service_telemetry_framework:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "A903C3AD-2D25-45B5-BF4A-A5BEB2286627",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4CFF558-3C47-480D-A2F0-BABF26042943",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
                     matchCriteriaId: "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:astra_control_center:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC5EBD2A-32A3-46D5-B155-B44DCB7F6902",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1BE6C1F-2565-4E97-92AA-16563E5660A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:akka:http_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2792650-851F-4820-B003-06A4BEA092D7",
                     versionEndExcluding: "10.5.3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:konghq:kong_gateway:*:*:*:*:enterprise:*:*:*",
                     matchCriteriaId: "9F6B63B9-F4C9-4A3F-9310-E0918E1070D1",
                     versionEndExcluding: "3.4.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
                     matchCriteriaId: "E6FF5F80-A991-43D4-B49F-D843E2BC5798",
                     versionEndIncluding: "2.414.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
                     matchCriteriaId: "54D25DA9-12D0-4F14-83E6-C69D0293AAB9",
                     versionEndIncluding: "2.427",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E1AFFB9-C717-4727-B0C9-5A0C281710E2",
                     versionEndExcluding: "9.4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:openresty:openresty:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "25C85001-E0AB-4B01-8EE7-1D9C77CD956E",
                     versionEndExcluding: "1.21.4.3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F98F9D27-6659-413F-8F29-4FDB0882AAC5",
                     versionEndExcluding: "11.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C98BF315-C563-47C2-BAD1-63347A3D1008",
                     versionEndExcluding: "4.1.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "705CBA49-21C9-4400-B7B9-71CDF9F97D8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA2BE0F1-DD16-4876-8EBA-F187BD38B159",
                     versionEndExcluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "796B6C58-2140-4105-A2A1-69865A194A75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEA99DC6-EA03-469F-A8BE-7F96FDF0B333",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6560DBF4-AFE6-4672-95DE-74A0B8F4170A",
                     versionEndExcluding: "x14.3.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "84785919-796D-41E5-B652-6B5765C81D4A",
                     versionEndExcluding: "7.4.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "92A74A1A-C69F-41E6-86D0-D6BB1C5D0A1E",
                     versionEndExcluding: "4.11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FE7BA33-2AC0-4A85-97AD-6D77F20BA2AD",
                     versionEndExcluding: "9.3.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FE2F959-1084-48D1-B1F1-8182FC9862DD",
                     versionEndExcluding: "7.2.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CC17E6B-D7AB-40D7-AEC5-F5B555AC4D7F",
                     versionEndExcluding: "3.10.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB6B48E-EA36-40A0-96D0-AF909BEC1147",
                     versionEndExcluding: "11.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CBED844-7F94-498C-836D-8593381A9657",
                     versionEndExcluding: "2.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C170DBA1-0899-4ECC-9A0D-8FEB1DA1B510",
                     versionEndExcluding: "2.19.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "358FA1DC-63D3-49F6-AC07-9E277DD0D9DA",
                     versionEndExcluding: "x14.3.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFF2D182-7599-4B81-B56B-F44EDA1384C0",
                     versionEndExcluding: "2024.01.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4868BCCA-24DE-4F24-A8AF-B3A545C0396E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "194F7A1F-FD43-4FF7-9AE2-C13AA5567E8A",
                     versionEndExcluding: "2024.02.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEC75F99-C7F0-47EB-9032-C9D3A42EBA20",
                     versionEndExcluding: "2024.02.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6638F4E-16F7-447D-B755-52640BCB1C61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC34F742-530E-4AB4-8AFC-D1E088E256B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D31CC0E9-8E21-436B-AB84-EA1B1BC60DCD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22AD683-345B-4E16-BB9E-E9B1783E09AD",
                     versionEndExcluding: "12.6.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5C0D694-9E24-4782-B35F-D7C3E3B0F2ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2955BEE9-F567-4006-B96D-92E10FF84DB4",
                     versionEndExcluding: "1.22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "67502878-DB20-4410-ABA0-A1C5705064CD",
                     versionEndExcluding: "17.15.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "177DED2D-8089-4494-BDD9-7F84FC06CD5B",
                     versionEndExcluding: "7.11.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:secure_web_appliance_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "54A29FD3-4128-4333-8445-A7DD04A6ECF6",
                     versionEndExcluding: "15.1.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:secure_web_appliance:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "67074526-9933-46B3-9FE3-A0BE73C5E8A7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEB32D2E-AD9D-44A0-AEF7-689F7D2605C9",
                     versionEndExcluding: "10.2\\(7\\)",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A236A0A-6956-4D79-B8E5-B2D0C79FAE88",
                     versionEndExcluding: "10.3\\(5\\)",
                     versionStartIncluding: "10.3\\(1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "528ED62B-D739-4E06-AC64-B506FD73BBAB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D402AB0-BCFB-4F42-8C50-5DC930AEEC8B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76C10D85-88AC-4A79-8866-BED88A0F8DF8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09AC2BAD-F536-48D0-A2F0-D4E290519EB6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65CB7F6D-A82B-4A31-BFAC-FF4A4B8DF9C1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECC4FFCC-E886-49BC-9737-5B5BA2AAB14B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F4E8EE4-031D-47D3-A12E-EE5F792172EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00CDD8C3-67D5-4E9F-9D48-A77B55DB0AB1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "41C14CC9-C244-4B86-AEA6-C50BAD5DA9A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8FF2EC4-0C09-4C00-9956-A2A4A894F63D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D14D4B4E-120E-4607-A4F1-447C7BF3052E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15702ACB-29F3-412D-8805-E107E0729E35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E930332-CDDD-48D5-93BC-C22D693BBFA2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_31108pv-v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "29B34855-D8D2-4114-80D2-A4D159C62458",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BF4B8FE-E134-4491-B5C2-C1CFEB64731B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4226DA0-9371-401C-8247-E6E636A116C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7664666F-BCE4-4799-AEEA-3A73E6AD33F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3DBBFE9-835C-4411-8492-6006E74BAC65",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3293438-3D18-45A2-B093-2C3F65783336",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C97C29EE-9426-4BBE-8D84-AB5FF748703D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3132q-x\\/3132q-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E142C18F-9FB5-4D96-866A-141D7D16CAF7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F43B770-D96C-44EA-BC12-9F39FC4317B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7817F4E6-B2DA-4F06-95A4-AF329F594C02",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CED628B5-97A8-4B26-AA40-BEC854982157",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BB9DD73-E31D-4921-A6D6-E14E04703588",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3172pq\\/pq-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EFC116A-627F-4E05-B631-651D161217C8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4532F513-0543-4960-9877-01F23CA7BA1B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B43502B-FD53-465A-B60F-6A359C6ACD99",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3229124-B097-4AAC-8ACD-2F9C89DCC3AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "32A532C0-B0E3-484A-B356-88970E7D0248",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3232:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C84D24C-2256-42AF-898A-221EBE9FE1E4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "652A2849-668D-4156-88FB-C19844A59F33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3232c_:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D008CA1C-6F5A-40EA-BB12-A9D84D5AF700",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "24FBE87B-8A4F-43A8-98A3-4A7D9C630937",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ACD09AC-8B28-4ACB-967B-AB3D450BC137",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43913A0E-50D5-47DD-94D8-DD3391633619",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D397349-CCC6-479B-9273-FB1FFF4F34F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC7286A7-780F-4A45-940A-4AD5C9D0F201",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA52D5C1-13D8-4D23-B022-954CCEF491F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F7AF8D7-431B-43CE-840F-CC0817D159C0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAC204C8-1A5A-4E85-824E-DC9B8F6A802D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8E1073F-D374-4311-8F12-AD8C72FAA293",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAF5AF71-15DF-4151-A1CF-E138A7103FC8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10F80A72-AD54-4699-B8AE-82715F0B58E2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3524-x\\/xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E505C0B1-2119-4C6A-BF96-C282C633D169",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9354B6A2-D7D6-442E-BF4C-FE8A336D9E94",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "088C0323-683A-44F5-8D42-FF6EC85D080E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "74CB4002-7636-4382-B33E-FBA060A13C34",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3548-x\\/xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "915EF8F6-6039-4DD0-B875-30D911752B74",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CEBF73-3EE0-459A-86C5-F8F6243FE27C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97217080-455C-48E4-8CE1-6D5B9485864F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "95D2C4C3-65CE-4612-A027-AF70CEFC3233",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57572E4A-78D5-4D1A-938B-F05F01759612",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEB32D2E-AD9D-44A0-AEF7-689F7D2605C9",
                     versionEndExcluding: "10.2\\(7\\)",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A236A0A-6956-4D79-B8E5-B2D0C79FAE88",
                     versionEndExcluding: "10.3\\(5\\)",
                     versionStartIncluding: "10.3\\(1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CD9C1F1-8582-4F67-A77D-97CBFECB88B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "532CE4B0-A3C9-4613-AAAF-727817D06FB4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9200yc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "24CA1A59-2681-4507-AC74-53BD481099B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4283E433-7F8C-4410-B565-471415445811",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_92160yc_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF9147C9-5D8B-40F5-9AAA-66A3495A0AD8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9221c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFB9FDE8-8533-4F65-BF32-4066D042B2F7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F80AB6FB-32FD-43D7-A9F1-80FA47696210",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_92300yc_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA5389A-8AD1-476E-983A-54DF573C30F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5B2E4C1-2627-4B9D-8E92-4B483F647651",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_92304qc_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1B1A8F1-45B1-4E64-A254-7191FA93CB6D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9232e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "83DA8BFA-D7A2-476C-A6F5-CAE610033BC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "557ED31C-C26A-4FAE-8B14-D06B49F7F08B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11411BFD-3F4D-4309-AB35-A3629A360FB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9236c_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB2FFD26-8255-4351-8594-29D2AEFC06EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E663DE91-C86D-48DC-B771-FA72A8DF7A7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9272q_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "61E10975-B47E-4F4D-8096-AEC7B7733612",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "92E2CB2B-DA11-4CF7-9D57-3D4D48990DC0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A90184B3-C82F-4CE5-B2AD-97D5E4690871",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40E40F42-632A-47DF-BE33-DC25B826310B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93108tc-ex_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C67B7A6-9BB2-41FC-8FA3-8D0DF67CBC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AB89849-6DA4-4C9D-BC3F-EE0E41FD1901",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C47F6BF9-2ADB-41A4-8D7D-8BB00141BB23",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93108tc-fx3h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C64136-89C2-443C-AF7B-BED81D3DE25A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBEF7F26-BB47-44BD-872E-130820557C23",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07DE6F63-2C7D-415B-8C34-01EC05C062F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93120tx_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "182000E0-8204-4D8B-B7DE-B191AFE12E28",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93128:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F309E7B9-B828-4CD2-9D2B-8966EE5B9CC1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F423E45D-A6DD-4305-9C6A-EAB26293E53A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93128tx_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDC208BC-7E19-48C6-A20E-A79A51B7362C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "102F91CD-DFB6-43D4-AE5B-DA157A696230",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E952A96A-0F48-4357-B7DD-1127D8827650",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180lc-ex_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "084D0191-563B-4FF0-B589-F35DA118E1C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180tc-ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7DB6FC5-762A-4F16-AE8C-69330EFCF640",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F70D81F1-8B12-4474-9060-B4934D8A3873",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5394DE31-3863-4CA9-B7B1-E5227183100D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180yc-ex_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "968390BC-B430-4903-B614-13104BFAE635",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7349D69B-D8FA-4462-AA28-69DD18A652D9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE4BB834-2C00-4384-A78E-AF3BCDDC58AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0D30D52-837F-4FDA-B8E5-A9066E9C6D2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180yc-fx3h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6678B8A-D905-447E-BE7E-6BFB4CC5DAFE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CE49B45-F2E9-491D-9C29-1B46E9CE14E2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1CC5F78-E88B-4B82-9E3E-C73D3A49DE26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93240tc-fx2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BFAD21E-59EE-4CCE-8F1E-621D2EA50905",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91231DC6-2773-4238-8C14-A346F213B5E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF88547-BAF4-47B0-9F60-80A30297FCEB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9332d-gx2b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02C3CE6D-BD54-48B1-A188-8E53DA001424",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9332d-h2r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "498991F7-39D6-428C-8C7D-DD8DC72A0346",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "113772B6-E9D2-4094-9468-3F4E1A87D07D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9332pq_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7B90D36-5124-4669-8462-4EAF35B0F53D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C45A38D6-BED6-4FEF-AD87-A1E813695DE0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1FC2B1F-232E-4754-8076-CC82F3648730",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CDD27C9-5EAF-4956-8AB7-740C84C9D4FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9336pq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F1127D2-12C0-454F-91EF-5EE334070D06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9336pq_aci:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D6EB963-E0F2-4A02-8765-AB2064BE19E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "785FD17C-F32E-4042-9DDE-A89B3AAE0334",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9336pq_aci_spine_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEAAF99B-5406-4722-81FB-A91CBAC2DF41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9348d-gx2a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "73DC1E93-561E-490C-AE0E-B02BAB9A7C8E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9348gc-fx3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12DA2DE5-8ADA-4D6A-BC1A-9C06FA163B1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17C7E3DB-8E1A-47AD-B1C5-61747DC0CFB9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CF467E2-4567-426E-8F48-39669E0F514C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63842B25-8C32-4988-BBBD-61E9CB09B4F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68EA1FEF-B6B6-49FE-A0A4-5387F76303F8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9364d-gx2a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40D6DB7F-C025-4971-9615-73393ED61078",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4364ADB9-8162-451D-806A-B98924E6B2CF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B53BCB42-ED61-4FCF-8068-CB467631C63C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372px-e_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "737C724A-B6CD-4FF7-96E0-EBBF645D660E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372px_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7067AEC7-DFC8-4437-9338-C5165D9A8F36",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49E0371B-FDE2-473C-AA59-47E1269D050F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "489D11EC-5A18-4F32-BC7C-AC1FCEC27222",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372tx-e_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71D4CF15-B293-4403-A1A9-96AD3933BAEF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372tx_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBCC1515-2DBE-4DF2-8E83-29A869170F36",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BC5293E-F2B4-46DC-85DA-167EA323FCFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9396px_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7282AAFF-ED18-4992-AC12-D953C35EC328",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA022E77-6557-4A33-9A3A-D028E2DB669A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9396tx_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "360409CC-4172-4878-A76B-EA1C1F8C7A79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9408:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8D5D5E2-B40B-475D-9EF3-8441016E37E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9432pq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDA8E1F0-74A6-4725-B6AA-A1112EFC5D0C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BE0266-1C00-4D6A-AD96-7F82532ABAA7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9500_16-slot:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "73F59A4B-AE92-4533-8EDC-D1DD850309FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9500_4-slot:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492A2C86-DD38-466B-9965-77629A73814F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9500_8-slot:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FB7AA46-4018-4925-963E-719E1037F759",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9500_supervisor_a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "31B9D1E4-10B9-4B6F-B848-D93ABF6486D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9500_supervisor_a\\+:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB270C45-756E-400A-979F-D07D750C881A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9500_supervisor_b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E8A085C-2DBA-4269-AB01-B16019FBB4DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9500_supervisor_b\\+:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A79DD582-AF68-44F1-B640-766B46EF2BE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9500r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B04484DA-AA59-4833-916E-6A8C96D34F0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "768BE390-5ED5-48A7-9E80-C4DE8BA979B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9504_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D07B5399-44C7-468D-9D57-BB5B5E26CE50",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9508_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76FB64F-16F0-4B0B-B304-B46258D434BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E02DC82-0D26-436F-BA64-73C958932B0A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9516_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E128053-834B-4DD5-A517-D14B4FC2B56F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9536pq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "163743A1-09E7-4EC5-8ECA-79E4B9CE173B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9636pq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE340E4C-DC48-4FC8-921B-EE304DB5AE0A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9716d-gx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C367BBE0-D71F-4CB5-B50E-72B033E73FE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9736pq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85E1D224-4751-4233-A127-A041068C804A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD31B075-01B1-429E-83F4-B999356A0EB9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9804:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A10C9C0A-C96A-4B45-90D0-6ED457EB5F4C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9808:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3284D16F-3275-4F8D-8AE4-D413DE19C4FA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
      },
      {
         lang: "es",
         value: "El protocolo HTTP/2 permite una denegación de servicio (consumo de recursos del servidor) porque la cancelación de solicitudes puede restablecer muchas transmisiones rápidamente, como se explotó en la naturaleza entre agosto y octubre de 2023.",
      },
   ],
   id: "CVE-2023-44487",
   lastModified: "2025-04-12T01:00:01.957",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-10-10T14:15:10.883",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/10/6",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/10/7",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/13/4",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/13/9",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/18/4",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/18/8",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/19/6",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/20/8",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://access.redhat.com/security/cve/cve-2023-44487",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Press/Media Coverage",
            "Third Party Advisory",
         ],
         url: "https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://aws.amazon.com/security/security-bulletins/AWS-2023-011/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Technical Description",
            "Vendor Advisory",
         ],
         url: "https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "Vendor Advisory",
         ],
         url: "https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Press/Media Coverage",
            "Third Party Advisory",
         ],
         url: "https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://blog.vespa.ai/cve-2023-44487/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.proxmox.com/show_bug.cgi?id=4988",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=2242803",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://bugzilla.suse.com/show_bug.cgi?id=1216123",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Technical Description",
            "Vendor Advisory",
         ],
         url: "https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Technical Description",
            "Vendor Advisory",
         ],
         url: "https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/Azure/AKS/issues/3947",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/Kong/kong/discussions/11741",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://github.com/advisories/GHSA-qppj-fm5r-hxr3",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://github.com/advisories/GHSA-vx74-f528-fxqg",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://github.com/advisories/GHSA-xpw8-rcwv-8f8p",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/akka/akka-http/issues/4323",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/alibaba/tengine/issues/1872",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/apache/apisix/issues/10320",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/apache/httpd-site/pull/10",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
         ],
         url: "https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Third Party Advisory",
         ],
         url: "https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/apache/trafficserver/pull/10564",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/bcdannyboy/CVE-2023-44487",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://github.com/caddyserver/caddy/issues/5877",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/caddyserver/caddy/releases/tag/v2.7.5",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://github.com/dotnet/announcements/issues/277",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Release Notes",
         ],
         url: "https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/eclipse/jetty.project/issues/10679",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/envoyproxy/envoy/pull/30055",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/etcd-io/etcd/issues/16740",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/facebook/proxygen/pull/466",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/golang/go/issues/63417",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/grpc/grpc-go/pull/6703",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://github.com/grpc/grpc/releases/tag/v1.59.2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/h2o/h2o/pull/3291",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/haproxy/haproxy/issues/2312",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
         ],
         url: "https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/junkurihara/rust-rpxy/issues/97",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/kazu-yamamoto/http2/issues/93",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/kubernetes/kubernetes/pull/121120",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/line/armeria/pull/5232",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://github.com/micrictor/http2-rst-stream",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/microsoft/CBL-Mariner/pull/6381",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/nghttp2/nghttp2/pull/1961",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
         ],
         url: "https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/ninenines/cowboy/issues/1615",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/nodejs/node/pull/50121",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/openresty/openresty/issues/930",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/opensearch-project/data-prepper/issues/3474",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/oqtane/oqtane.framework/discussions/3367",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/projectcontour/contour/pull/5826",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/tempesta-tech/tempesta/issues/1986",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/varnishcache/varnish-cache/issues/3996",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://istio.io/latest/news/security/istio-security-2023-004/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://my.f5.com/manage/s/article/K000137106",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://netty.io/news/2023/10/10/4-1-100-Final.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://news.ycombinator.com/item?id=37830987",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Press/Media Coverage",
         ],
         url: "https://news.ycombinator.com/item?id=37830998",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://news.ycombinator.com/item?id=37831062",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://news.ycombinator.com/item?id=37837043",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202311-09",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20231016-0001/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20240426-0007/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20240621-0006/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20240621-0007/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://security.paloaltonetworks.com/CVE-2023-44487",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
         ],
         url: "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://ubuntu.com/security/CVE-2023-44487",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Press/Media Coverage",
            "Third Party Advisory",
         ],
         url: "https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5521",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5522",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5540",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5549",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5558",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5570",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "Vendor Advisory",
         ],
         url: "https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.openwall.com/lists/oss-security/2023/10/10/6",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Press/Media Coverage",
         ],
         url: "https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Press/Media Coverage",
            "Third Party Advisory",
         ],
         url: "https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/13/4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/13/9",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/18/4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/18/8",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/19/6",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/20/8",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://access.redhat.com/security/cve/cve-2023-44487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Press/Media Coverage",
            "Third Party Advisory",
         ],
         url: "https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://aws.amazon.com/security/security-bulletins/AWS-2023-011/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Technical Description",
            "Vendor Advisory",
         ],
         url: "https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "Vendor Advisory",
         ],
         url: "https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Press/Media Coverage",
            "Third Party Advisory",
         ],
         url: "https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://blog.vespa.ai/cve-2023-44487/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.proxmox.com/show_bug.cgi?id=4988",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=2242803",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://bugzilla.suse.com/show_bug.cgi?id=1216123",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Technical Description",
            "Vendor Advisory",
         ],
         url: "https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Technical Description",
            "Vendor Advisory",
         ],
         url: "https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/Azure/AKS/issues/3947",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/Kong/kong/discussions/11741",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://github.com/advisories/GHSA-qppj-fm5r-hxr3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://github.com/advisories/GHSA-vx74-f528-fxqg",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://github.com/advisories/GHSA-xpw8-rcwv-8f8p",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/akka/akka-http/issues/4323",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/alibaba/tengine/issues/1872",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/apache/apisix/issues/10320",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/apache/httpd-site/pull/10",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
         ],
         url: "https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Third Party Advisory",
         ],
         url: "https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/apache/trafficserver/pull/10564",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/bcdannyboy/CVE-2023-44487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://github.com/caddyserver/caddy/issues/5877",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/caddyserver/caddy/releases/tag/v2.7.5",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://github.com/dotnet/announcements/issues/277",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Release Notes",
         ],
         url: "https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/eclipse/jetty.project/issues/10679",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/envoyproxy/envoy/pull/30055",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/etcd-io/etcd/issues/16740",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/facebook/proxygen/pull/466",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/golang/go/issues/63417",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/grpc/grpc-go/pull/6703",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/h2o/h2o/pull/3291",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/haproxy/haproxy/issues/2312",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
         ],
         url: "https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/junkurihara/rust-rpxy/issues/97",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/kazu-yamamoto/http2/issues/93",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/kubernetes/kubernetes/pull/121120",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/line/armeria/pull/5232",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://github.com/micrictor/http2-rst-stream",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/microsoft/CBL-Mariner/pull/6381",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/nghttp2/nghttp2/pull/1961",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
         ],
         url: "https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/ninenines/cowboy/issues/1615",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/nodejs/node/pull/50121",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/openresty/openresty/issues/930",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/opensearch-project/data-prepper/issues/3474",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/oqtane/oqtane.framework/discussions/3367",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/projectcontour/contour/pull/5826",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/tempesta-tech/tempesta/issues/1986",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/varnishcache/varnish-cache/issues/3996",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://istio.io/latest/news/security/istio-security-2023-004/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://my.f5.com/manage/s/article/K000137106",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://netty.io/news/2023/10/10/4-1-100-Final.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://news.ycombinator.com/item?id=37830987",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Press/Media Coverage",
         ],
         url: "https://news.ycombinator.com/item?id=37830998",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://news.ycombinator.com/item?id=37831062",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://news.ycombinator.com/item?id=37837043",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202311-09",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20231016-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20240426-0007/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20240621-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20240621-0007/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://security.paloaltonetworks.com/CVE-2023-44487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
         ],
         url: "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://ubuntu.com/security/CVE-2023-44487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Press/Media Coverage",
            "Third Party Advisory",
         ],
         url: "https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5521",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5522",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5540",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5549",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5558",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5570",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "Vendor Advisory",
         ],
         url: "https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.openwall.com/lists/oss-security/2023/10/10/6",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Press/Media Coverage",
         ],
         url: "https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Press/Media Coverage",
            "Third Party Advisory",
         ],
         url: "https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-10-08 18:15
Modified
2024-10-16 21:44
Summary
Visual C++ Redistributable Installer Elevation of Privilege Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "00680F8D-9858-4706-8888-4130E4CDA76B",
                     versionEndExcluding: "15.9.67",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1915924B-3EB6-4EF4-9DC8-31A98C858ADD",
                     versionEndExcluding: "15.9.67",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "111ACA28-0E8E-4F6D-BE67-F2E0703BC33F",
                     versionEndExcluding: "16.11.41",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "18D2A92E-FB5F-4892-A7EF-0DBD26281248",
                     versionEndExcluding: "17.6.20",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "34609790-24EF-448C-8AED-9BF831D73629",
                     versionEndExcluding: "17.8.15",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "480AA116-1C38-4778-A84D-321278AEC747",
                     versionEndExcluding: "17.10.8",
                     versionStartIncluding: "17.10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD8D6C06-D7AB-4E82-AAD6-4240603B6AC6",
                     versionEndExcluding: "17.11.5",
                     versionStartIncluding: "17.11.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual C++ Redistributable Installer Elevation of Privilege Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de elevación de privilegios en el instalador redistribuible de Visual C++",
      },
   ],
   id: "CVE-2024-43590",
   lastModified: "2024-10-16T21:44:50.927",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-10-08T18:15:26.913",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43590",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-284",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-10-08 18:15
Modified
2024-10-17 19:55
Summary
Visual Studio Collector Service Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio:2015:update3:*:*:*:*:*:*",
                     matchCriteriaId: "62FE95C2-066B-491D-82BF-3EF173822B2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "23634494-9964-4281-B202-0FABD7312448",
                     versionEndExcluding: "15.9.67",
                     versionStartIncluding: "15.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2021602-110C-4F29-A538-6B609C6FE5C0",
                     versionEndExcluding: "16.11.41",
                     versionStartIncluding: "16.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "18D2A92E-FB5F-4892-A7EF-0DBD26281248",
                     versionEndExcluding: "17.6.20",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "34609790-24EF-448C-8AED-9BF831D73629",
                     versionEndExcluding: "17.8.15",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "480AA116-1C38-4778-A84D-321278AEC747",
                     versionEndExcluding: "17.10.8",
                     versionStartIncluding: "17.10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD8D6C06-D7AB-4E82-AAD6-4240603B6AC6",
                     versionEndExcluding: "17.11.5",
                     versionStartIncluding: "17.11.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Collector Service Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de denegación de servicio del servicio recopilador de Visual Studio",
      },
   ],
   id: "CVE-2024-43603",
   lastModified: "2024-10-17T19:55:34.360",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-10-08T18:15:28.150",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43603",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-59",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-01-09 18:15
Modified
2024-11-21 08:45
Summary
NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability
Impacted products
Vendor Product Version
microsoft powershell *
microsoft powershell *
microsoft powershell 7.4
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft .net_framework *
microsoft windows_10_1607 -
microsoft windows_10_1607 -
microsoft windows_server_2008 r2
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft windows_server_2016 -
microsoft .net_framework *
microsoft windows_server_2008 r2
microsoft .net_framework 4.6.2
microsoft .net_framework 4.7
microsoft .net_framework 4.7.1
microsoft .net_framework 4.7.2
microsoft windows_server_2008 r2
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft .net_framework 3.5
microsoft .net_framework 4.8.1
microsoft windows_10_1809 -
microsoft windows_10_1809 -
microsoft windows_10_21h2 -
microsoft windows_10_21h2 -
microsoft windows_10_21h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_11_21h2 -
microsoft windows_11_21h2 -
microsoft windows_11_22h2 -
microsoft windows_11_22h2 -
microsoft windows_11_23h2 -
microsoft windows_11_23h2 -
microsoft windows_server_2019 -
microsoft windows_server_2022 -
microsoft windows_server_2022_23h2 -
microsoft .net_framework *
microsoft .net_framework 3.5
microsoft windows_10_1809 -
microsoft windows_10_1809 -
microsoft windows_10_21h2 -
microsoft windows_10_21h2 -
microsoft windows_10_21h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_11_21h2 -
microsoft windows_11_21h2 -
microsoft windows_11_22h2 -
microsoft windows_11_22h2 -
microsoft windows_server_2019 -
microsoft windows_server_2022 -
microsoft windows_server_2022_23h2 -
microsoft .net_framework 3.5
microsoft .net_framework 4.7.2
microsoft windows_10_1607 -
microsoft windows_10_1607 -
microsoft windows_10_1809 -
microsoft windows_10_1809 -
microsoft windows_10_1809 -
microsoft windows_server_2016 -
microsoft windows_server_2019 -
microsoft .net_framework 2.0
microsoft .net_framework 3.0
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft .net *
microsoft .net *
microsoft .net 8.0.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "79FFDD43-C822-4C24-BEBE-D5DBC069E1E0",
                     versionEndExcluding: "7.2.18",
                     versionStartIncluding: "7.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2295A08D-C53B-40F8-961E-B115471735A3",
                     versionEndExcluding: "7.3.11",
                     versionStartIncluding: "7.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:7.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "FFAAFDC7-5AA2-43E6-BE0B-7E0C02FC39C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "05D999A1-AB25-4642-8D94-07AD00FEE820",
                     versionEndExcluding: "17.2.23",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE1C61FB-CC6B-4D88-8B7F-FFE9D1238A6C",
                     versionEndExcluding: "17.4.15",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9C0A3-7D62-40CE-8493-514CB313F72C",
                     versionEndExcluding: "17.6.11",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD49CC9F-3750-4EB3-A934-E45F0DE41238",
                     versionEndExcluding: "17.8.4",
                     versionStartIncluding: "17.8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "071AF08C-F921-45EC-A6AC-3BCE75D7FB22",
                     versionEndExcluding: "4.8.04690.02",
                     versionStartIncluding: "4.8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "0A1BC97A-263E-4291-8AEF-02EE4E6031E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F2BA42-96F4-4DD6-ADFC-B5B8D45BCB78",
                     versionEndExcluding: "4.8.04690.01",
                     versionStartIncluding: "4.8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "734112B3-1383-4BE3-8721-C0F84566B764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "36B0E40A-84EF-4099-A395-75D6B8CDA196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "934D4E46-12C1-41DC-A28C-A2C430E965E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "306B7CE6-8239-4AED-9ED4-4C9F5B349F58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "345FCD64-D37B-425B-B64C-8B1640B7E850",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "8FC46499-DB6E-48BF-9334-85EE27AFE7AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "83A79DD6-E74E-419F-93F1-323B68502633",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "61959ACC-B608-4556-92AF-4D94B338907A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "A9D54EE6-30AF-411C-A285-A4DCB6C6EC06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C230D3BF-7FCE-405C-B62E-B9190C995C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1FD62DCB-66D1-4CEA-828E-0BD302AC63CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "F2D718BD-C4B7-48DB-BE78-B9CA22F27DD0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "0C3552E0-F793-4CDD-965D-457495475805",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "B2D24C54-F04F-4717-B614-FE67B3ED9DC0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "D5EC3F68-8F41-4F6B-B2E5-920322A4A321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "B0301BA0-81DB-4FC1-9BC3-EB48A56BC608",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "8E3C1327-F331-4448-A253-00EAC7428317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75CCACE6-A0EE-4A6F-BD5A-7AA504B02717",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "071AF08C-F921-45EC-A6AC-3BCE75D7FB22",
                     versionEndExcluding: "4.8.04690.02",
                     versionStartIncluding: "4.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "306B7CE6-8239-4AED-9ED4-4C9F5B349F58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "345FCD64-D37B-425B-B64C-8B1640B7E850",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "8FC46499-DB6E-48BF-9334-85EE27AFE7AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "83A79DD6-E74E-419F-93F1-323B68502633",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "61959ACC-B608-4556-92AF-4D94B338907A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "A9D54EE6-30AF-411C-A285-A4DCB6C6EC06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C230D3BF-7FCE-405C-B62E-B9190C995C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1FD62DCB-66D1-4CEA-828E-0BD302AC63CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "F2D718BD-C4B7-48DB-BE78-B9CA22F27DD0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "0C3552E0-F793-4CDD-965D-457495475805",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "B2D24C54-F04F-4717-B614-FE67B3ED9DC0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "D5EC3F68-8F41-4F6B-B2E5-920322A4A321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75CCACE6-A0EE-4A6F-BD5A-7AA504B02717",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "0A1BC97A-263E-4291-8AEF-02EE4E6031E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "73D24713-D897-408D-893B-77A61982597D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "306B7CE6-8239-4AED-9ED4-4C9F5B349F58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "345FCD64-D37B-425B-B64C-8B1640B7E850",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "42A6DF09-B8E1-414D-97E7-453566055279",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "D400E856-2B2E-4CEA-8CA5-309FDF371CEA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "498DF6C9-EC7C-4A4F-A188-B22E82FD6540",
                     versionEndExcluding: "6.0.26",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE00AC7-D405-4567-8CB1-C3ED7E2925C6",
                     versionEndExcluding: "7.0.15",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:8.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "2BD92442-4815-4085-B66F-9A610097A41B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabididad en NET, .NET Framework y Visual Studio Security Feature Bypass",
      },
   ],
   id: "CVE-2024-0057",
   lastModified: "2024-11-21T08:45:49.400",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 9.1,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.2,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-01-09T18:15:46.980",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0057",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0057",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20240208-0007/",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-05-14 17:17
Modified
2025-01-08 18:29
Summary
Visual Studio Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "98AEF40E-333C-4B7C-A1A7-522459C01F90",
                     versionEndExcluding: "7.0.19",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A6ED34-B810-42BF-9256-8632F965EBED",
                     versionEndExcluding: "8.0.5",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8851D8F-C0FC-4957-846E-BEF69B88B9D6",
                     versionEndExcluding: "17.4.19",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "24B799F3-962A-4366-9B5C-2F60E2098B7D",
                     versionEndExcluding: "17.6.15",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "55C50579-44BA-4C6A-9CD5-A71D3D80F4E5",
                     versionEndExcluding: "17.8.10",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA2D642F-B4D4-4B84-ACCA-653201079267",
                     versionEndExcluding: "17.9.7",
                     versionStartIncluding: "17.9.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de denegación de servicio de Visual Studio",
      },
   ],
   id: "CVE-2024-30046",
   lastModified: "2025-01-08T18:29:04.867",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 5.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-05-14T17:17:17.880",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30046",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30046",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-362",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-362",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-10-11 19:15
Modified
2025-02-28 21:15
Summary
NuGet Client Elevation of Privilege Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "1DE0C8DD-9C73-4876-8193-068F18074B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_core:3.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "70BE107E-20A0-4998-A8ED-BCC414C6BDBF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "934AEA86-2ADF-4F66-B82E-21C5E4596D1E",
                     versionEndExcluding: "16.9.26",
                     versionStartIncluding: "16.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F070085-823C-47AF-A5F1-78DBAFCC6650",
                     versionEndExcluding: "16.11.20",
                     versionStartIncluding: "16.10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C25BC49-47B0-45EF-BB60-712AEAA1FC11",
                     versionEndExcluding: "17.0.15",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CE00F6E-3DE0-467A-889C-D79AA1D7C5FF",
                     versionEndExcluding: "17.2.9",
                     versionStartIncluding: "17.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:-:*:*",
                     matchCriteriaId: "384F7218-E192-4366-AA42-8A9E2E2C214C",
                     versionEndExcluding: "17.3.6",
                     versionStartIncluding: "17.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "BBECAB10-EEE3-4974-BA51-729397E2F8AE",
                     versionEndExcluding: "17.3.7",
                     versionStartIncluding: "17.3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
                     matchCriteriaId: "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "NuGet Client Elevation of Privilege Vulnerability",
      },
      {
         lang: "es",
         value: "Una Vulnerabilidad de Elevación de Privilegios en el cliente NuGet",
      },
   ],
   id: "CVE-2022-41032",
   lastModified: "2025-02-28T21:15:18.340",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-10-11T19:15:20.483",
   references: [
      {
         source: "secure@microsoft.com",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41032",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FOG35Z5RL5W5RGLLYLN46CI4D2UPDSWM/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDPT2MJC3HD7HYZGASOOX6MTDR4ASBL5/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X7BMHO5ITRBZREVTEKHQRGSFRPDMALV3/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41032",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-269",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-12-15 15:15
Modified
2024-11-21 06:29
Summary
ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FE4072E-3226-435C-BC61-A775D3EF2822",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5C2DF1D-063A-432E-8E7A-39A9C7C9582D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E907B35E-144C-43AA-9902-3F19ACAE3D77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:16.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "E47AD481-C23D-4610-B9BC-844F7B8F7A28",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:16.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF6CF9B0-D279-42CD-A84D-48327F44422D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:16.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "99E7DAC9-17EF-40D4-AEEC-C24970B7190F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3393F97F-05CD-4B04-A6E1-3D914652C4E5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Elevación de Privilegios en ASP.NET Core y Visual Studio",
      },
   ],
   id: "CVE-2021-43877",
   lastModified: "2024-11-21T06:29:58.677",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2,
            impactScore: 6,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Secondary",
         },
      ],
   },
   published: "2021-12-15T15:15:10.950",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43877",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43877",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2025-01-14 18:16
Modified
2025-01-17 15:47
Summary
Visual Studio Elevation of Privilege Vulnerability
Impacted products
Vendor Product Version
microsoft visual_studio_2022 *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CDB41EA-38E1-4325-8DE7-27E187C1695B",
                     versionEndExcluding: "17.12.4",
                     versionStartIncluding: "17.12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Elevation of Privilege Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de elevación de privilegios en Visual Studio",
      },
   ],
   id: "CVE-2025-21405",
   lastModified: "2025-01-17T15:47:39.780",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.3,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2025-01-14T18:16:04.507",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21405",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-284",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-14 00:15
Modified
2024-11-21 08:04
Summary
.NET and Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A00E1F46-D02A-42C8-9292-F38BE98DE1CD",
                     versionEndExcluding: "6.0.18",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FABF6D4-EA23-4234-90D3-0D9306A2994B",
                     versionEndExcluding: "7.0.7",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1F98BC-0D82-4AEB-9E1E-D67325E99385",
                     versionEndExcluding: "17.0.22",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6B0B496-BC41-4F9D-9A28-AE7664B5C77D",
                     versionEndExcluding: "17.2.16",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC861E65-1682-4E99-8A7B-F4A31DDC0198",
                     versionEndExcluding: "17.4.8",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51DB90D6-C1C4-43B9-8B37-696CB361F37F",
                     versionEndExcluding: "17.6.3",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
   ],
   id: "CVE-2023-33126",
   lastModified: "2024-11-21T08:04:56.533",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.3,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-06-14T00:15:11.853",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33126",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33126",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-04-09 17:15
Modified
2025-01-14 20:48
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "453652D6-37A7-49BC-8660-330EADA8CCDD",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "422283AD-E25A-4779-BB9A-0E496BFAC524",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "9BDD3D5D-70D5-4767-95DC-25873774B536",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "C8B405E1-CC25-4883-A26D-4A4237E43FB0",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "7236DD21-703E-4359-88AD-E68C3B1D33FE",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "948FC47B-E7FE-404A-A747-18DA61D35A3F",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "DD9CBEE2-6BF0-45E5-8DAA-2749344ECCFE",
                     versionEndExcluding: "15.0.2110.4",
                     versionStartIncluding: "15.0.2000.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C9C35D21-EE02-4562-8196-7A4781DECF06",
                     versionEndExcluding: "15.0.4360.2",
                     versionStartIncluding: "15.0.4003.23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "6A943249-37AA-4E3B-A074-7E87EC4CD040",
                     versionEndExcluding: "16.0.1115.1",
                     versionStartIncluding: "16.0.1000.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "2ADF9550-5FAA-4696-9F59-8D235B989541",
                     versionEndExcluding: "16.0.4120.1",
                     versionStartIncluding: "16.0.4003.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B69AEE86-A505-42EA-ADD3-FB0F6346C2FA",
                     versionEndExcluding: "16.11.35",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8133E65A-AE80-4266-A445-265908DD8E21",
                     versionEndExcluding: "17.4.18",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "35FAD418-A4C1-40C3-8F08-A08CA1190BB0",
                     versionEndExcluding: "17.6.14",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "39E176F7-8E26-4175-98FE-99288ADD2DA3",
                     versionEndExcluding: "17.8.9",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2188B97-2B2C-445A-B667-2C3269B94959",
                     versionEndExcluding: "17.9.6",
                     versionStartIncluding: "17.9.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código del controlador ODBC de Microsoft para SQL Server",
      },
   ],
   id: "CVE-2024-28932",
   lastModified: "2025-01-14T20:48:30.367",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-04-09T17:15:54.297",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28932",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28932",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-122",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-07-09 17:15
Modified
2024-11-21 09:24
Summary
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
Impacted products
Vendor Product Version
microsoft .net_framework 4.6.2
microsoft .net_framework 4.7
microsoft .net_framework 4.7.1
microsoft .net_framework 4.7.2
microsoft windows_server_2008 r2
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft .net_framework 3.5
microsoft .net_framework 4.8
microsoft windows_10_1607 *
microsoft windows_10_1607 *
microsoft windows_10_1809 *
microsoft windows_10_21h2 *
microsoft windows_10_22h2 *
microsoft windows_11_21h2 *
microsoft windows_server_2008 r2
microsoft windows_server_2012 *
microsoft windows_server_2012 r2
microsoft windows_server_2016 *
microsoft windows_server_2019 *
microsoft windows_server_2022 *
microsoft .net_framework 3.5.1
microsoft windows_server_2008 r2
microsoft .net_framework 3.5
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft windows_server_2012 *
microsoft windows_server_2012 r2
microsoft .net_framework 3.0
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft .net_framework 2.0
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft .net_framework 4.6.2
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft .net_framework 4.8.1
microsoft windows_10_21h2 *
microsoft windows_10_22h2 *
microsoft windows_11_21h2 *
microsoft windows_11_22h2 *
microsoft windows_11_23h2 *
microsoft windows_server_2022 *
microsoft windows_server_2022_23h2 *
microsoft .net *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft .net_framework 3.5
microsoft .net_framework 4.7.2
microsoft windows_10_1607 *
microsoft windows_10_1607 -
microsoft windows_10_1809 *
microsoft windows_server_2016 *
microsoft windows_server_2019 *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "734112B3-1383-4BE3-8721-C0F84566B764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "36B0E40A-84EF-4099-A395-75D6B8CDA196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "D00F295B-6ECF-43C4-BD71-98F835CCDB0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1648C361-E25C-42FE-8543-03DE56100201",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E2A7014-8078-4C40-91E3-ACA60A98AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "979081E3-FB60-43E0-BF86-ED301E7EF25C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F7487B8-BE4D-4707-9E20-39840A260831",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "47D0AB10-CD2F-4500-A4D6-CC2BA724036C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*",
                     matchCriteriaId: "B7674920-AE12-4A25-BE57-34AEDDA74D76",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "AA1CCA3D-299D-4BCD-8565-98083C40525C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*",
                     matchCriteriaId: "8968BAC8-A1DB-4F88-89F8-4BE47919C247",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF6437F9-6631-49D3-A6C2-62329E278E31",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E4E76DC-838A-46D7-BC09-E2C149699050",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F0241B0-855A-489C-9AAE-68BC2556F24D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EDC4407-7E92-4E60-82F0-0C87D1860D3A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*",
                     matchCriteriaId: "B7674920-AE12-4A25-BE57-34AEDDA74D76",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "AA1CCA3D-299D-4BCD-8565-98083C40525C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*",
                     matchCriteriaId: "8968BAC8-A1DB-4F88-89F8-4BE47919C247",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "D400E856-2B2E-4CEA-8CA5-309FDF371CEA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "42A6DF09-B8E1-414D-97E7-453566055279",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "934D4E46-12C1-41DC-A28C-A2C430E965E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "979081E3-FB60-43E0-BF86-ED301E7EF25C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F7487B8-BE4D-4707-9E20-39840A260831",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "47D0AB10-CD2F-4500-A4D6-CC2BA724036C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CB5C848-9883-4FE0-9A6B-B7B52E704AC1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "50D643A0-5F16-4D63-BF83-19DF8F93AE25",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F0241B0-855A-489C-9AAE-68BC2556F24D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B822942-B429-406C-A13A-A2379AA952CF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1233A609-9772-490F-80F5-8AA750BF25CE",
                     versionEndExcluding: "6.0.32",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EF1832B-95B7-4253-92EC-0912987D8C42",
                     versionEndExcluding: "17.4.21",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB946EB4-95CC-42FC-9D47-445D7E1C3E38",
                     versionEndExcluding: "17.6.17",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "65299FC5-169B-4642-B961-647EEE2DA0BD",
                     versionEndExcluding: "17.8.12",
                     versionStartIncluding: "17.8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "D00F295B-6ECF-43C4-BD71-98F835CCDB0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "0A1BC97A-263E-4291-8AEF-02EE4E6031E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E2A7014-8078-4C40-91E3-ACA60A98AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF6437F9-6631-49D3-A6C2-62329E278E31",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E4E76DC-838A-46D7-BC09-E2C149699050",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de elevación de privilegios en .NET, .NET Framework y Visual Studio",
      },
   ],
   id: "CVE-2024-38081",
   lastModified: "2024-11-21T09:24:51.970",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.3,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-07-09T17:15:43.750",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38081",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38081",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-59",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-03-09 17:15
Modified
2024-11-21 06:50
Summary
.NET and Visual Studio Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D986C83E-F055-4861-B3FC-D1AE2662A826",
                     versionEndIncluding: "5.0.14",
                     versionStartIncluding: "5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C933FD8-CBE5-43C7-873A-CC2C47E2BF3A",
                     versionEndIncluding: "6.0.2",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB57B616-F5BD-47B7-BBD0-AF58976CEE10",
                     versionEndIncluding: "3.1.22",
                     versionStartIncluding: "3.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6222A0C-EC9B-4AB2-A89F-5D62B381A212",
                     versionEndIncluding: "16.6.4",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "367AC9B2-D639-40F6-93FB-822F73E65C30",
                     versionEndExcluding: "16.7.26",
                     versionStartIncluding: "16.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC9599DF-664B-4630-9FCD-7FCD846728A1",
                     versionEndIncluding: "16.8.7",
                     versionStartIncluding: "16.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4338A4F9-0FE2-40F4-B184-86B9F5EF1EED",
                     versionEndExcluding: "16.9.18",
                     versionStartIncluding: "16.9.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B6E2777-4D9B-4710-9575-250B04E1AE0C",
                     versionEndIncluding: "16.10.4",
                     versionStartIncluding: "16.10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1265006-B9CB-4E89-B6E8-F9EC1D6C7405",
                     versionEndExcluding: "16.11.11",
                     versionStartIncluding: "16.11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C72810F-D156-49CE-A325-7E6A63C9E4A3",
                     versionEndExcluding: "17.0.7",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                     matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Denegación de Servicio en .NET y Visual Studio",
      },
   ],
   id: "CVE-2022-24464",
   lastModified: "2024-11-21T06:50:28.410",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
      ],
   },
   published: "2022-03-09T17:15:14.277",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24464",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24464",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-14 22:15
Modified
2025-01-01 03:15
Summary
ASP.NET Core Security Feature Bypass Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC1456FF-8BB7-4D7D-A03E-22A2CDE8A094",
                     versionEndExcluding: "6.0.25",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "73A23066-A84B-4E76-B0ED-63BA1A9C1263",
                     versionEndExcluding: "7.0.14",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:8.0.0:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "5F3CB225-CDF6-4730-A20C-891AB87CBB9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:8.0.0:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "6F9C3F37-0A3B-45D4-86B1-B42FDA8D8EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C29B573F-A45D-440B-913F-27AB0A46BCA2",
                     versionEndExcluding: "6.0.25",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E923109F-46CA-4581-933D-D65C83D72390",
                     versionEndExcluding: "7.0.14",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:8.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "81F3914E-4A24-4434-8487-31F45948BE86",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EABB880-0CBA-45CD-A197-CB1EE1710061",
                     versionEndExcluding: "17.2.22",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCC513DB-075E-4D09-B289-902F3C16BFB7",
                     versionEndExcluding: "17.4.14",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "56738F2F-8802-4ADB-AC7C-9BAD67626C75",
                     versionEndExcluding: "17.6.10",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD1B0CE9-6A87-47DC-A27B-9587A6B5B45D",
                     versionEndExcluding: "17.7.7",
                     versionStartIncluding: "17.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "ASP.NET Core Security Feature Bypass Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de omisión de funciones de seguridad en ASP.NET Core",
      },
   ],
   id: "CVE-2023-36558",
   lastModified: "2025-01-01T03:15:20.607",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 6.2,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.5,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-14T22:15:29.323",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36558",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36558",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-04-12 18:15
Modified
2024-11-21 06:51
Summary
GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED09ED2B-246F-4521-AA68-6DD61DDAEC70",
                     versionEndExcluding: "15.9.46",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A3B8509-5DF9-417D-A4C4-13AA04EE9688",
                     versionEndExcluding: "16.7.27",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D74FEFE9-B2D6-44A4-88F4-B82F25549905",
                     versionEndExcluding: "16.9.19",
                     versionStartIncluding: "16.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "25D61E58-23F2-491F-A69D-325236D33F5F",
                     versionEndExcluding: "16.11.12",
                     versionStartIncluding: "16.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F014358-A908-4B23-A071-4F8A1F307AD0",
                     versionEndExcluding: "17.0.8",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F2374A6-18AC-4856-8BD0-979F1BECC522",
                     versionEndExcluding: "17.1.4",
                     versionStartIncluding: "17.1.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:git_for_windows_project:git_for_windows:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C4FF412-E806-4D42-AA6A-FE021BCD9829",
                     versionEndExcluding: "2.35.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account.",
      },
      {
         lang: "es",
         value: "GitHub: El desinstalador de Git para Windows es vulnerable al secuestro de DLL cuando se ejecuta bajo la cuenta de usuario SYSTEM",
      },
   ],
   id: "CVE-2022-24767",
   lastModified: "2024-11-21T06:51:03.240",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.9,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:M/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.4,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2022-04-12T18:15:09.510",
   references: [
      {
         source: "security-advisories@github.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24767",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24767",
      },
   ],
   sourceIdentifier: "security-advisories@github.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-427",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-427",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-09-13 19:15
Modified
2025-01-02 20:15
Summary
.NET Core and Visual Studio Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "1DE0C8DD-9C73-4876-8193-068F18074B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_core:3.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "70BE107E-20A0-4998-A8ED-BCC414C6BDBF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:16.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF6CF9B0-D279-42CD-A84D-48327F44422D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:16.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "99E7DAC9-17EF-40D4-AEEC-C24970B7190F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3393F97F-05CD-4B04-A6E1-3D914652C4E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB70FC91-06DB-4E92-9C0B-6FDE078F911B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C0E9FAF-2CDC-42E4-B2BB-44E6136E3D22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.3:*:*:*:*:mac:*:*",
                     matchCriteriaId: "EEAB6255-1A4D-443D-AD81-830E3EC30CFB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
                     matchCriteriaId: "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET Core and Visual Studio Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Denegación de Servicio en .NET Core and Visual Studio",
      },
   ],
   id: "CVE-2022-38013",
   lastModified: "2025-01-02T20:15:59.087",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2022-09-13T19:15:12.867",
   references: [
      {
         source: "secure@microsoft.com",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38013",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2CUL3Z7MEED7RFQZVGQL2MTKSFFZKAAY/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7HCV4TQGOTOFHO5ETRKGFKAGYV2YAUVE/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JA6F4CDKLI3MALV6UK3P2DR5AGCLTT7Y/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4K5YL7USOKIR3O2DUKBZMYPWXYPDKXG/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WL334CKOHA6BQQSYJW365HIWJ4IOE45M/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38013",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-04-09 17:15
Modified
2025-01-14 20:50
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "453652D6-37A7-49BC-8660-330EADA8CCDD",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "422283AD-E25A-4779-BB9A-0E496BFAC524",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "9BDD3D5D-70D5-4767-95DC-25873774B536",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "C8B405E1-CC25-4883-A26D-4A4237E43FB0",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "7236DD21-703E-4359-88AD-E68C3B1D33FE",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "948FC47B-E7FE-404A-A747-18DA61D35A3F",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "DD9CBEE2-6BF0-45E5-8DAA-2749344ECCFE",
                     versionEndExcluding: "15.0.2110.4",
                     versionStartIncluding: "15.0.2000.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C9C35D21-EE02-4562-8196-7A4781DECF06",
                     versionEndExcluding: "15.0.4360.2",
                     versionStartIncluding: "15.0.4003.23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "6A943249-37AA-4E3B-A074-7E87EC4CD040",
                     versionEndExcluding: "16.0.1115.1",
                     versionStartIncluding: "16.0.1000.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "2ADF9550-5FAA-4696-9F59-8D235B989541",
                     versionEndExcluding: "16.0.4120.1",
                     versionStartIncluding: "16.0.4003.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B69AEE86-A505-42EA-ADD3-FB0F6346C2FA",
                     versionEndExcluding: "16.11.35",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8133E65A-AE80-4266-A445-265908DD8E21",
                     versionEndExcluding: "17.4.18",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "35FAD418-A4C1-40C3-8F08-A08CA1190BB0",
                     versionEndExcluding: "17.6.14",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "39E176F7-8E26-4175-98FE-99288ADD2DA3",
                     versionEndExcluding: "17.8.9",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2188B97-2B2C-445A-B667-2C3269B94959",
                     versionEndExcluding: "17.9.6",
                     versionStartIncluding: "17.9.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código del controlador ODBC de Microsoft para SQL Server",
      },
   ],
   id: "CVE-2024-28937",
   lastModified: "2025-01-14T20:50:38.043",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-04-09T17:15:55.393",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28937",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28937",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-122",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-02-09 17:15
Modified
2024-11-21 06:45
Summary
.NET Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "784A6ABC-33DC-4E8E-9236-60B1D06F97A3",
                     versionEndExcluding: "5.0.14",
                     versionStartIncluding: "5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "44F0F99C-213A-405F-878D-752EC049D66E",
                     versionEndExcluding: "6.0.2",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "E52E5F11-3D97-4755-B49E-2E3C2CCAA365",
                     versionEndExcluding: "8.10.18",
                     versionStartIncluding: "8.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9984FFB-8AFA-438F-B762-B98649B64B23",
                     versionEndIncluding: "16.11",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAA3B633-7F8C-40C4-9AA5-0CF3BFE2C17D",
                     versionEndExcluding: "17.0.6",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                     matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Una Vulnerabilidad de Denegación de Servicio en .NET",
      },
   ],
   id: "CVE-2022-21986",
   lastModified: "2024-11-21T06:45:50.113",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
      ],
   },
   published: "2022-02-09T17:15:08.907",
   references: [
      {
         source: "secure@microsoft.com",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21986",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21986",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-09-12 17:15
Modified
2024-11-21 08:10
Summary
Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EDC4407-7E92-4E60-82F0-0C87D1860D3A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "42A6DF09-B8E1-414D-97E7-453566055279",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "D400E856-2B2E-4CEA-8CA5-309FDF371CEA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "5F422A8C-2C4E-42C8-B420-E0728037E15C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E332666-2E03-468E-BC30-299816D6E8ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F513002-D8C1-4D3A-9F79-4B52498F67E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB4AE761-6FAC-4000-A63D-42CE3FAB8412",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "934D4E46-12C1-41DC-A28C-A2C430E965E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F513002-D8C1-4D3A-9F79-4B52498F67E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB4AE761-6FAC-4000-A63D-42CE3FAB8412",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4793BFB-2E4E-4067-87A5-4B8749025CA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "61019899-D7AF-46E4-A72C-D189180F66AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E332666-2E03-468E-BC30-299816D6E8ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "734112B3-1383-4BE3-8721-C0F84566B764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "36B0E40A-84EF-4099-A395-75D6B8CDA196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "1DE0C8DD-9C73-4876-8193-068F18074B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4E2C6C0-FD91-40D9-B1A4-C1C348A156C7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "482C808D-C0EB-479D-B8A2-D7B04DB4854F",
                     versionEndExcluding: "15.9.57",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "40434953-906B-453E-9F4C-46BF0F693E06",
                     versionEndExcluding: "16.11.30",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7698BEE-8540-4F0C-A500-1393055B88F4",
                     versionEndExcluding: "17.2.19",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8174DBE5-A4BB-4FA6-B921-B2E82B08DAC9",
                     versionEndExcluding: "17.4.11",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8241557-9AD7-42D9-AF07-4C7C1A19AB53",
                     versionEndExcluding: "17.7.4",
                     versionStartIncluding: "17.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de Ejecución Remota de Códigode Visual Studio",
      },
   ],
   id: "CVE-2023-36792",
   lastModified: "2024-11-21T08:10:36.220",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-09-12T17:15:14.510",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36792",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36792",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-06-11 17:15
Modified
2024-11-21 09:11
Summary
Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8EB2D6-5BAF-46C4-95CC-E9742E82D0A6",
                     versionEndExcluding: "15.9.63",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7EA3169-4405-4451-9FDA-AE826B1B4B38",
                     versionEndIncluding: "16.11.37",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6993B949-BB1A-4341-85D4-CB79406A755E",
                     versionEndExcluding: "17.4.20",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7187D7EB-112B-4240-BB55-9443C4397263",
                     versionEndExcluding: "17.6.16",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "85BA04C4-11BD-4038-9B7C-93AE02FAF03C",
                     versionEndExcluding: "17.8.11",
                     versionStartIncluding: "17.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "70C6E63C-4CF8-4A54-A07E-88FE56A9045B",
                     versionEndExcluding: "17.10.2",
                     versionStartIncluding: "17.10",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código de Visual Studio",
      },
   ],
   id: "CVE-2024-30052",
   lastModified: "2024-11-21T09:11:08.930",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-06-11T17:15:51.600",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30052",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30052",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-693",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-08-08 19:15
Modified
2024-11-21 08:08
Summary
ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA257401-7276-4427-8692-7B5A6495F182",
                     versionEndExcluding: "6.0.21",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2239C44-5436-4968-959B-C686E0FAECD1",
                     versionEndExcluding: "7.0.10",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "65CCEE15-3742-40B0-9241-1779929F529F",
                     versionEndExcluding: "2.1.40",
                     versionStartIncluding: "2.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DADAE1CA-1303-4B24-A9EC-E79A83088E49",
                     versionEndExcluding: "17.2.18",
                     versionStartIncluding: "17.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2A151F0-EE6A-4D89-BF83-74CCAA76E373",
                     versionEndExcluding: "17.4.10",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB465155-CEDD-48E5-8B58-AF49B8FAF504",
                     versionEndExcluding: "17.6.6",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability",
      },
   ],
   id: "CVE-2023-35391",
   lastModified: "2024-11-21T08:08:22.370",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 6.2,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.5,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-08T19:15:09.940",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35391",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35391",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-10-08 18:15
Modified
2024-10-16 15:36
Summary
.NET and Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "18D2A92E-FB5F-4892-A7EF-0DBD26281248",
                     versionEndExcluding: "17.6.20",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "34609790-24EF-448C-8AED-9BF831D73629",
                     versionEndExcluding: "17.8.15",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "480AA116-1C38-4778-A84D-321278AEC747",
                     versionEndExcluding: "17.10.8",
                     versionStartIncluding: "17.10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD8D6C06-D7AB-4E82-AAD6-4240603B6AC6",
                     versionEndExcluding: "17.11.5",
                     versionStartIncluding: "17.11.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D977AC32-7583-44F0-B48D-ACB001DA164A",
                     versionEndExcluding: "8.0.10",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código en .NET y Visual Studio",
      },
   ],
   id: "CVE-2024-38229",
   lastModified: "2024-10-16T15:36:38.317",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-10-08T18:15:08.153",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38229",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-08-08 19:15
Modified
2025-03-10 20:30
Summary
.NET and Visual Studio Denial of Service Vulnerability



{
   cisaActionDue: "2023-08-30",
   cisaExploitAdd: "2023-08-09",
   cisaRequiredAction: "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
   cisaVulnerabilityName: "Microsoft .NET Core and Visual Studio Denial-of-Service Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA257401-7276-4427-8692-7B5A6495F182",
                     versionEndExcluding: "6.0.21",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2239C44-5436-4968-959B-C686E0FAECD1",
                     versionEndExcluding: "7.0.10",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "65CCEE15-3742-40B0-9241-1779929F529F",
                     versionEndExcluding: "2.1.40",
                     versionStartIncluding: "2.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DADAE1CA-1303-4B24-A9EC-E79A83088E49",
                     versionEndExcluding: "17.2.18",
                     versionStartIncluding: "17.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2A151F0-EE6A-4D89-BF83-74CCAA76E373",
                     versionEndExcluding: "17.4.10",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB465155-CEDD-48E5-8B58-AF49B8FAF504",
                     versionEndExcluding: "17.6.6",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
                     matchCriteriaId: "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Denial of Service Vulnerability",
      },
   ],
   id: "CVE-2023-38180",
   lastModified: "2025-03-10T20:30:38.527",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-08T19:15:10.367",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-04-09 17:15
Modified
2025-01-14 20:47
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "DD9CBEE2-6BF0-45E5-8DAA-2749344ECCFE",
                     versionEndExcluding: "15.0.2110.4",
                     versionStartIncluding: "15.0.2000.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C9C35D21-EE02-4562-8196-7A4781DECF06",
                     versionEndExcluding: "15.0.4360.2",
                     versionStartIncluding: "15.0.4003.23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "6A943249-37AA-4E3B-A074-7E87EC4CD040",
                     versionEndExcluding: "16.0.1115.1",
                     versionStartIncluding: "16.0.1000.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "2ADF9550-5FAA-4696-9F59-8D235B989541",
                     versionEndExcluding: "16.0.4120.1",
                     versionStartIncluding: "16.0.4003.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "71F3ADE2-848B-44E4-9B1A-447A725CBF1F",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "F0DF0DC4-29BF-42C3-8F94-E53C33E5318E",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "9BDD3D5D-70D5-4767-95DC-25873774B536",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "DC8634AD-9CB8-4996-979E-6EFC7845FE1B",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "6A058D66-C6A5-4E4A-A8C6-EC4DDF67887F",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "948FC47B-E7FE-404A-A747-18DA61D35A3F",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B69AEE86-A505-42EA-ADD3-FB0F6346C2FA",
                     versionEndExcluding: "16.11.35",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8133E65A-AE80-4266-A445-265908DD8E21",
                     versionEndExcluding: "17.4.18",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "35FAD418-A4C1-40C3-8F08-A08CA1190BB0",
                     versionEndExcluding: "17.6.14",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "39E176F7-8E26-4175-98FE-99288ADD2DA3",
                     versionEndExcluding: "17.8.9",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2188B97-2B2C-445A-B667-2C3269B94959",
                     versionEndExcluding: "17.9.6",
                     versionStartIncluding: "17.9.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código del controlador ODBC de Microsoft para SQL Server",
      },
   ],
   id: "CVE-2024-28929",
   lastModified: "2025-01-14T20:47:41.253",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-04-09T17:15:53.673",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28929",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28929",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-07-11 18:15
Modified
2025-01-01 02:15
Summary
ASP.NET and Visual Studio Security Feature Bypass Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5730CE86-D1BB-403D-BE28-09BAC686B645",
                     versionEndExcluding: "6.0.20",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EBEC922-21D4-458E-B9A9-A29CAD09C2D3",
                     versionEndExcluding: "7.0.9",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "46E1B01E-2B9A-4666-A680-DED9669FD62B",
                     versionEndExcluding: "17.0.23",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "63B52F8F-CF6B-40C5-B4D9-342FA4C3D21C",
                     versionEndExcluding: "17.2.17",
                     versionStartIncluding: "17.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "45D57A7D-14A4-4916-B029-12E8D3C8EDAD",
                     versionEndExcluding: "17.4.9",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8771AEC-CE62-4C47-922A-A6205FDF3ECE",
                     versionEndExcluding: "17.6.5",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
                     matchCriteriaId: "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "ASP.NET and Visual Studio Security Feature Bypass Vulnerability",
      },
   ],
   id: "CVE-2023-33170",
   lastModified: "2025-01-01T02:15:49.803",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-07-11T18:15:15.660",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVZVMMCCBBCSCPAW2CRQGOTKIHVFCMRO/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5CFOR6ID2HP45E7ZOGQNX76FPIWP7XR/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TLWNIIA2I6YCYVCXYBPBRSZ3UH6KILTG/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3VJRGNYJXGPF5LXUG3NL45QPK2UU6PL/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-362",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-362",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-08-09 20:15
Modified
2024-11-21 07:11
Summary
Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio:2012:update_5:*:*:*:*:*:*",
                     matchCriteriaId: "28CC44DA-DF23-400D-9299-7DF3EECD89E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio:2013:update_5:*:*:*:*:*:*",
                     matchCriteriaId: "4A820094-4660-4CFA-BAF1-ED4DBF45AD46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio:2015:update3:*:*:*:*:*:*",
                     matchCriteriaId: "62FE95C2-066B-491D-82BF-3EF173822B2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE03B37D-72FE-4C25-BE62-9C422AEFC80E",
                     versionEndIncluding: "15.9",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9984FFB-8AFA-438F-B762-B98649B64B23",
                     versionEndIncluding: "16.11",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3393F97F-05CD-4B04-A6E1-3D914652C4E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB70FC91-06DB-4E92-9C0B-6FDE078F911B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Ejecución de Código Remota en Visual Studio. Este ID de CVE es diferente de CVE-2022-35825, CVE-2022-35826, CVE-2022-35827",
      },
   ],
   id: "CVE-2022-35777",
   lastModified: "2024-11-21T07:11:39.990",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2022-08-09T20:15:12.703",
   references: [
      {
         source: "secure@microsoft.com",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35777",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35777",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-02-14 21:15
Modified
2024-11-21 07:43
Summary
Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "832BAB52-5118-4E00-955D-BF3716B288D0",
                     versionEndExcluding: "15.9.52",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "821BE24D-9EEE-42FE-B4E7-5C682F6B34C4",
                     versionEndExcluding: "16.11.24",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AA616AA-25E5-4943-A614-99FF6DFF260E",
                     versionEndExcluding: "17.0.19",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "191993E5-B343-45A6-B485-F45F5D8E924D",
                     versionEndExcluding: "17.2.13",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F16E4665-E579-4211-92C0-D8058F73A359",
                     versionEndExcluding: "17.4.5",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código de Visual Studio",
      },
   ],
   id: "CVE-2023-21815",
   lastModified: "2024-11-21T07:43:42.360",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Secondary",
         },
      ],
   },
   published: "2023-02-14T21:15:11.990",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21815",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21815",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-191",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-11-12 18:15
Modified
2024-11-16 00:03
Summary
Visual Studio Elevation of Privilege Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DEC4BF6-8208-444A-A1EE-B357DE764DDE",
                     versionEndExcluding: "17.6.21",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B5EFF64-49AE-4F5B-A959-F0C56AAE313C",
                     versionEndExcluding: "17.8.16",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B85CEE4B-546D-4DBF-8673-96859149F05F",
                     versionEndExcluding: "17.10.9",
                     versionStartIncluding: "17.10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FCE50CB-B8BC-4C62-86AC-4B5DC0F0A8BA",
                     versionEndExcluding: "17.11.6",
                     versionStartIncluding: "17.11.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Elevation of Privilege Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de elevación de privilegios en Visual Studio",
      },
   ],
   id: "CVE-2024-49044",
   lastModified: "2024-11-16T00:03:54.977",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L",
               version: "3.1",
            },
            exploitabilityScore: 1.2,
            impactScore: 5.5,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-11-12T18:15:44.867",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49044",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-284",
            },
         ],
         source: "secure@microsoft.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-02-13 18:15
Modified
2024-11-21 08:54
Summary
.NET Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "152AECFB-BB7E-40FC-B9FF-6CAA908B34E4",
                     versionEndExcluding: "6.0.27",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBAFB920-6975-4E01-B75B-5AB6991281CD",
                     versionEndExcluding: "7.0.16",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BDF34C1-9C87-4EAB-8DBD-49CF6ED87522",
                     versionEndExcluding: "8.0.2",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "474DB3BE-DF4D-4F8B-B4ED-8D2EECBED45F",
                     versionEndExcluding: "17.4.16",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDFA874A-0DB4-41F3-9122-29F1842B951F",
                     versionEndExcluding: "17.6.12",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "96B56F8A-097E-4A57-9CA9-5255CE3B9924",
                     versionEndExcluding: "17.8.7",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de denegación de servicio de .NET",
      },
   ],
   id: "CVE-2024-21404",
   lastModified: "2024-11-21T08:54:17.470",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-02-13T18:15:59.023",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21404",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21404",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-10-08 18:15
Modified
2024-10-21 18:01
Summary
.NET and Visual Studio Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA23E158-EEDE-46D9-ADA2-43A07949A326",
                     versionEndExcluding: "6.0.35",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D977AC32-7583-44F0-B48D-ACB001DA164A",
                     versionEndExcluding: "8.0.10",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "18D2A92E-FB5F-4892-A7EF-0DBD26281248",
                     versionEndExcluding: "17.6.20",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "34609790-24EF-448C-8AED-9BF831D73629",
                     versionEndExcluding: "17.8.15",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "480AA116-1C38-4778-A84D-321278AEC747",
                     versionEndExcluding: "17.10.8",
                     versionStartIncluding: "17.10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD8D6C06-D7AB-4E82-AAD6-4240603B6AC6",
                     versionEndExcluding: "17.11.5",
                     versionStartIncluding: "17.11.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de denegación de servicio en .NET y Visual Studio",
      },
   ],
   id: "CVE-2024-43485",
   lastModified: "2024-10-21T18:01:28.623",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-10-08T18:15:10.840",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43485",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-407",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-11-09 22:15
Modified
2024-11-21 07:22
Summary
Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE03B37D-72FE-4C25-BE62-9C422AEFC80E",
                     versionEndIncluding: "15.9",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9984FFB-8AFA-438F-B762-B98649B64B23",
                     versionEndIncluding: "16.11",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3393F97F-05CD-4B04-A6E1-3D914652C4E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB70FC91-06DB-4E92-9C0B-6FDE078F911B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C0E9FAF-2CDC-42E4-B2BB-44E6136E3D22",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código de Visual Studio",
      },
   ],
   id: "CVE-2022-41119",
   lastModified: "2024-11-21T07:22:39.473",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2022-11-09T22:15:24.813",
   references: [
      {
         source: "secure@microsoft.com",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41119",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41119",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-04-11 21:15
Modified
2024-11-21 07:54
Summary
Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DA31D6C-5369-40DC-99F8-90B997461BE6",
                     versionEndExcluding: "15.9.54",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6B51259-1136-4B2D-8E02-76EF121FE9A9",
                     versionEndExcluding: "16.11.26",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "06B7E408-A6EC-4556-A535-3F3340F314F7",
                     versionEndExcluding: "17.0.21",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:-:*:*",
                     matchCriteriaId: "16287ED1-84CC-42D7-888D-9F1C5278A93F",
                     versionEndExcluding: "17.2.15",
                     versionStartIncluding: "17.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:-:*:*",
                     matchCriteriaId: "C0075BF4-95C0-491C-AA2C-A7013C47EFDA",
                     versionEndExcluding: "17.4.7",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:-:*:*",
                     matchCriteriaId: "B7D4F983-B988-419C-9C94-E567E94A179E",
                     versionEndExcluding: "17.5.4",
                     versionStartIncluding: "17.5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Remote Code Execution Vulnerability",
      },
   ],
   id: "CVE-2023-28296",
   lastModified: "2024-11-21T07:54:46.780",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-04-11T21:15:27.407",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28296",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28296",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-415",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-04-11 21:15
Modified
2024-11-21 07:54
Summary
Visual Studio Elevation of Privilege Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6B51259-1136-4B2D-8E02-76EF121FE9A9",
                     versionEndExcluding: "16.11.26",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "06B7E408-A6EC-4556-A535-3F3340F314F7",
                     versionEndExcluding: "17.0.21",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "78A2B957-0654-45EF-ADE4-EEDA380D4583",
                     versionEndExcluding: "17.2.15",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CFF8AF1-4BEE-4CED-ADB5-8B7DE3C6A6E6",
                     versionEndExcluding: "17.4.7",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D305BC5-DF3E-45FE-9421-385D6A1E9EFC",
                     versionEndExcluding: "17.5.4",
                     versionStartIncluding: "17.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Elevation of Privilege Vulnerability",
      },
   ],
   id: "CVE-2023-28262",
   lastModified: "2024-11-21T07:54:43.140",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-04-11T21:15:25.563",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28262",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28262",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-122",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2025-02-11 18:15
Modified
2025-02-28 16:12
Summary
Visual Studio Installer Elevation of Privilege Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7148C3A7-9A70-4560-9A0C-94951B2C9B49",
                     versionEndExcluding: "15.9.70",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E672587A-4C0E-40F9-9417-0E9F91BC0361",
                     versionEndExcluding: "16.11.44",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AD60982-A18A-446A-970E-212B3F351925",
                     versionEndExcluding: "17.8.18",
                     versionStartIncluding: "17.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "950538A7-8681-497B-BB96-A040B9989362",
                     versionEndExcluding: "17.10.11",
                     versionStartIncluding: "17.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7F01478-80E9-4E46-AD9B-CC6D095347D3",
                     versionEndExcluding: "17.12.5",
                     versionStartIncluding: "17.12",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Installer Elevation of Privilege Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de elevación de privilegios en el instalador de Visual Studio",
      },
   ],
   id: "CVE-2025-21206",
   lastModified: "2025-02-28T16:12:14.997",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.3,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2025-02-11T18:15:31.610",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21206",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-427",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-09-15 10:15
Modified
2024-11-21 05:39
Summary
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
References
cve-coordination@google.comhttp://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.htmlMailing List, Third Party Advisory
cve-coordination@google.comhttps://github.com/google/brotli/releases/tag/v1.0.9Release Notes, Third Party Advisory
cve-coordination@google.comhttps://lists.debian.org/debian-lts-announce/2020/12/msg00003.htmlMailing List, Third Party Advisory
cve-coordination@google.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH/
cve-coordination@google.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/
cve-coordination@google.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6/
cve-coordination@google.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6/
cve-coordination@google.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP/
cve-coordination@google.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/
cve-coordination@google.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I/
cve-coordination@google.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK/
cve-coordination@google.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/
cve-coordination@google.comhttps://usn.ubuntu.com/4568-1/Third Party Advisory
cve-coordination@google.comhttps://www.debian.org/security/2020/dsa-4801Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/google/brotli/releases/tag/v1.0.9Release Notes, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2020/12/msg00003.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4568-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2020/dsa-4801Third Party Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:google:brotli:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A0C4F94-96AA-45AE-A3A6-55DE4FD744E3",
                     versionEndExcluding: "1.0.8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                     matchCriteriaId: "36D96259-24BD-44E2-96D9-78CE1D41F956",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
                     matchCriteriaId: "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                     matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                     matchCriteriaId: "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "902B8056-9E37-443B-8905-8AA93E2447FB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B009C22E-30A4-4288-BCF6-C3E81DEAF45A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D986C83E-F055-4861-B3FC-D1AE2662A826",
                     versionEndIncluding: "5.0.14",
                     versionStartIncluding: "5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB57B616-F5BD-47B7-BBD0-AF58976CEE10",
                     versionEndIncluding: "3.1.22",
                     versionStartIncluding: "3.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "77F72A4A-239D-4362-B42C-2B125FD977AB",
                     versionEndExcluding: "7.0.9",
                     versionStartIncluding: "7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2C644EF-33B6-440F-8051-6A0D3C096F67",
                     versionEndExcluding: "7.1.6",
                     versionStartIncluding: "7.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD5CE10E-FCBF-4FBA-9B4E-BEB7F7E902A1",
                     versionEndExcluding: "7.2.2",
                     versionStartIncluding: "7.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9984FFB-8AFA-438F-B762-B98649B64B23",
                     versionEndIncluding: "16.11",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "962BF425-75A7-4743-A3EA-275F8D66A00B",
                     versionEndIncluding: "17.0.7",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "950638D8-6997-4058-8A9E-6153A7FC3B32",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a \"one-shot\" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the \"streaming\" API as opposed to the \"one-shot\" API, and impose chunk size limits.",
      },
      {
         lang: "es",
         value: "Se presenta un desbordamiento del búfer en la biblioteca Brotli versiones anteriores a 1.0.8, donde un atacante que controla la longitud de entrada de una petición de descompresión \"one-shot\" en un script puede desencadenar un bloqueo, que ocurre cuando se copian fragmentos de datos de más de 2 GiB .&#xa0;Se recomienda actualizar su biblioteca de Brotli a la versión 1.0.8 o posterior.&#xa0;Si no se puede actualizar, recomendamos usar la API \"streaming\" en lugar de la API \"one-shot\" e imponer límites de tamaño de fragmentos",
      },
   ],
   id: "CVE-2020-8927",
   lastModified: "2024-11-21T05:39:41.370",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.4,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "cve-coordination@google.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.5,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-09-15T10:15:12.887",
   references: [
      {
         source: "cve-coordination@google.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.html",
      },
      {
         source: "cve-coordination@google.com",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/google/brotli/releases/tag/v1.0.9",
      },
      {
         source: "cve-coordination@google.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2020/12/msg00003.html",
      },
      {
         source: "cve-coordination@google.com",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH/",
      },
      {
         source: "cve-coordination@google.com",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/",
      },
      {
         source: "cve-coordination@google.com",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6/",
      },
      {
         source: "cve-coordination@google.com",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6/",
      },
      {
         source: "cve-coordination@google.com",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP/",
      },
      {
         source: "cve-coordination@google.com",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/",
      },
      {
         source: "cve-coordination@google.com",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I/",
      },
      {
         source: "cve-coordination@google.com",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK/",
      },
      {
         source: "cve-coordination@google.com",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/",
      },
      {
         source: "cve-coordination@google.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4568-1/",
      },
      {
         source: "cve-coordination@google.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2020/dsa-4801",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/google/brotli/releases/tag/v1.0.9",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2020/12/msg00003.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4568-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2020/dsa-4801",
      },
   ],
   sourceIdentifier: "cve-coordination@google.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-130",
            },
         ],
         source: "cve-coordination@google.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-120",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-04-09 17:15
Modified
2025-01-14 20:48
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "453652D6-37A7-49BC-8660-330EADA8CCDD",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "422283AD-E25A-4779-BB9A-0E496BFAC524",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "9BDD3D5D-70D5-4767-95DC-25873774B536",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "C8B405E1-CC25-4883-A26D-4A4237E43FB0",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "7236DD21-703E-4359-88AD-E68C3B1D33FE",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "948FC47B-E7FE-404A-A747-18DA61D35A3F",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "DD9CBEE2-6BF0-45E5-8DAA-2749344ECCFE",
                     versionEndExcluding: "15.0.2110.4",
                     versionStartIncluding: "15.0.2000.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C9C35D21-EE02-4562-8196-7A4781DECF06",
                     versionEndExcluding: "15.0.4360.2",
                     versionStartIncluding: "15.0.4003.23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "6A943249-37AA-4E3B-A074-7E87EC4CD040",
                     versionEndExcluding: "16.0.1115.1",
                     versionStartIncluding: "16.0.1000.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "2ADF9550-5FAA-4696-9F59-8D235B989541",
                     versionEndExcluding: "16.0.4120.1",
                     versionStartIncluding: "16.0.4003.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B69AEE86-A505-42EA-ADD3-FB0F6346C2FA",
                     versionEndExcluding: "16.11.35",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8133E65A-AE80-4266-A445-265908DD8E21",
                     versionEndExcluding: "17.4.18",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "35FAD418-A4C1-40C3-8F08-A08CA1190BB0",
                     versionEndExcluding: "17.6.14",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "39E176F7-8E26-4175-98FE-99288ADD2DA3",
                     versionEndExcluding: "17.8.9",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2188B97-2B2C-445A-B667-2C3269B94959",
                     versionEndExcluding: "17.9.6",
                     versionStartIncluding: "17.9.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código del controlador ODBC de Microsoft para SQL Server",
      },
   ],
   id: "CVE-2024-28930",
   lastModified: "2025-01-14T20:48:06.263",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-04-09T17:15:53.887",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28930",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28930",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-191",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-14 00:15
Modified
2024-11-21 08:04
Summary
.NET and Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A00E1F46-D02A-42C8-9292-F38BE98DE1CD",
                     versionEndExcluding: "6.0.18",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FABF6D4-EA23-4234-90D3-0D9306A2994B",
                     versionEndExcluding: "7.0.7",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1F98BC-0D82-4AEB-9E1E-D67325E99385",
                     versionEndExcluding: "17.0.22",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6B0B496-BC41-4F9D-9A28-AE7664B5C77D",
                     versionEndExcluding: "17.2.16",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC861E65-1682-4E99-8A7B-F4A31DDC0198",
                     versionEndExcluding: "17.4.8",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51DB90D6-C1C4-43B9-8B37-696CB361F37F",
                     versionEndExcluding: "17.6.3",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
   ],
   id: "CVE-2023-33128",
   lastModified: "2024-11-21T08:04:56.780",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.3,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-06-14T00:15:11.910",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33128",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33128",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-04-09 17:15
Modified
2025-01-17 20:15
Summary
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
                     matchCriteriaId: "23317443-1968-4791-9F20-AD3B308A83D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "934D4E46-12C1-41DC-A28C-A2C430E965E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F513002-D8C1-4D3A-9F79-4B52498F67E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB4AE761-6FAC-4000-A63D-42CE3FAB8412",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4793BFB-2E4E-4067-87A5-4B8749025CA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "42D329B2-432D-4029-87EB-4C3C5F55CD95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B05D292-56AD-400B-A7A3-97D959631C39",
                     versionEndExcluding: "6.0.29",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F33385DC-EE3C-4DFA-985C-D5A08138614A",
                     versionEndExcluding: "7.0.18",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC730C07-617E-46FC-A9EC-6442E961AEAE",
                     versionEndExcluding: "8.0.4",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "98698302-E105-4FAD-A199-269BBCEDF872",
                     versionEndExcluding: "7.2.19",
                     versionStartIncluding: "7.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC909F7F-388D-4407-951A-3D22C6061EBC",
                     versionEndExcluding: "7.3.12",
                     versionStartIncluding: "7.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4C52BDA-482C-473D-AA57-9EECA060B374",
                     versionEndExcluding: "7.4.2",
                     versionStartIncluding: "7.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8133E65A-AE80-4266-A445-265908DD8E21",
                     versionEndExcluding: "17.4.18",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "35FAD418-A4C1-40C3-8F08-A08CA1190BB0",
                     versionEndExcluding: "17.6.14",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "39E176F7-8E26-4175-98FE-99288ADD2DA3",
                     versionEndExcluding: "17.8.9",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2188B97-2B2C-445A-B667-2C3269B94959",
                     versionEndExcluding: "17.9.6",
                     versionStartIncluding: "17.9.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
                     matchCriteriaId: "23317443-1968-4791-9F20-AD3B308A83D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "61019899-D7AF-46E4-A72C-D189180F66AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E332666-2E03-468E-BC30-299816D6E8ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "734112B3-1383-4BE3-8721-C0F84566B764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "36B0E40A-84EF-4099-A395-75D6B8CDA196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "61019899-D7AF-46E4-A72C-D189180F66AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E332666-2E03-468E-BC30-299816D6E8ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F513002-D8C1-4D3A-9F79-4B52498F67E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB4AE761-6FAC-4000-A63D-42CE3FAB8412",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "5F422A8C-2C4E-42C8-B420-E0728037E15C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código en .NET, .NET Framework y Visual Studio",
      },
   ],
   id: "CVE-2024-21409",
   lastModified: "2025-01-17T20:15:27.787",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.3,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-04-09T17:15:34.803",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21409",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21409",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20250117-0002/",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2025-01-14 18:15
Modified
2025-02-05 18:56
Summary
.NET Elevation of Privilege Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C373831-8981-462F-8A57-9C71D1839052",
                     versionEndExcluding: "17.6.22",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CA6DD18-569B-449D-82FF-4BE3A57E7150",
                     versionEndExcluding: "17.8.17",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDA7CDF2-DB37-4C34-9D5F-E09B34B83B1A",
                     versionEndExcluding: "17.10.10",
                     versionStartIncluding: "17.10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CDB41EA-38E1-4325-8DE7-27E187C1695B",
                     versionEndExcluding: "17.12.4",
                     versionStartIncluding: "17.12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:8.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECB25C50-5246-435F-B5C6-C4643ADBEC47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:9.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DFE5320-88E8-42C2-BC1C-E402FE71ECBB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET Elevation of Privilege Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de elevación de privilegios en .NET",
      },
   ],
   id: "CVE-2025-21173",
   lastModified: "2025-02-05T18:56:08.103",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.3,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2025-01-14T18:15:30.480",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21173",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-379",
            },
         ],
         source: "secure@microsoft.com",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-09-12 17:15
Modified
2024-11-21 08:10
Summary
.NET Core and Visual Studio Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "1DE0C8DD-9C73-4876-8193-068F18074B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4E2C6C0-FD91-40D9-B1A4-C1C348A156C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7698BEE-8540-4F0C-A500-1393055B88F4",
                     versionEndExcluding: "17.2.19",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8174DBE5-A4BB-4FA6-B921-B2E82B08DAC9",
                     versionEndExcluding: "17.4.11",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "16BAD93C-DFE9-4F94-99DC-230195CCD62A",
                     versionEndExcluding: "17.6.7",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8241557-9AD7-42D9-AF07-4C7C1A19AB53",
                     versionEndExcluding: "17.7.4",
                     versionStartIncluding: "17.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET Core and Visual Studio Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de Denegación de Servicio en .NET Core y Visual Studio",
      },
   ],
   id: "CVE-2023-36799",
   lastModified: "2024-11-21T08:10:36.957",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-09-12T17:15:15.253",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36799",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36799",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-04-09 17:15
Modified
2025-01-14 20:51
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "453652D6-37A7-49BC-8660-330EADA8CCDD",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "422283AD-E25A-4779-BB9A-0E496BFAC524",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "9BDD3D5D-70D5-4767-95DC-25873774B536",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "C8B405E1-CC25-4883-A26D-4A4237E43FB0",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "7236DD21-703E-4359-88AD-E68C3B1D33FE",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "948FC47B-E7FE-404A-A747-18DA61D35A3F",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "DD9CBEE2-6BF0-45E5-8DAA-2749344ECCFE",
                     versionEndExcluding: "15.0.2110.4",
                     versionStartIncluding: "15.0.2000.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C9C35D21-EE02-4562-8196-7A4781DECF06",
                     versionEndExcluding: "15.0.4360.2",
                     versionStartIncluding: "15.0.4003.23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "6A943249-37AA-4E3B-A074-7E87EC4CD040",
                     versionEndExcluding: "16.0.1115.1",
                     versionStartIncluding: "16.0.1000.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "2ADF9550-5FAA-4696-9F59-8D235B989541",
                     versionEndExcluding: "16.0.4120.1",
                     versionStartIncluding: "16.0.4003.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B69AEE86-A505-42EA-ADD3-FB0F6346C2FA",
                     versionEndExcluding: "16.11.35",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8133E65A-AE80-4266-A445-265908DD8E21",
                     versionEndExcluding: "17.4.18",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "35FAD418-A4C1-40C3-8F08-A08CA1190BB0",
                     versionEndExcluding: "17.6.14",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "39E176F7-8E26-4175-98FE-99288ADD2DA3",
                     versionEndExcluding: "17.8.9",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2188B97-2B2C-445A-B667-2C3269B94959",
                     versionEndExcluding: "17.9.6",
                     versionStartIncluding: "17.9.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código del controlador ODBC de Microsoft para SQL Server",
      },
   ],
   id: "CVE-2024-28938",
   lastModified: "2025-01-14T20:51:01.370",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-04-09T17:15:55.600",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28938",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28938",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-14 00:15
Modified
2024-11-21 08:04
Summary
.NET and Visual Studio Elevation of Privilege Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A00E1F46-D02A-42C8-9292-F38BE98DE1CD",
                     versionEndExcluding: "6.0.18",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FABF6D4-EA23-4234-90D3-0D9306A2994B",
                     versionEndExcluding: "7.0.7",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1F98BC-0D82-4AEB-9E1E-D67325E99385",
                     versionEndExcluding: "17.0.22",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6B0B496-BC41-4F9D-9A28-AE7664B5C77D",
                     versionEndExcluding: "17.2.16",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC861E65-1682-4E99-8A7B-F4A31DDC0198",
                     versionEndExcluding: "17.4.8",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51DB90D6-C1C4-43B9-8B37-696CB361F37F",
                     versionEndExcluding: "17.6.3",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Elevation of Privilege Vulnerability",
      },
   ],
   id: "CVE-2023-33135",
   lastModified: "2024-11-21T08:04:57.700",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.3,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.3,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-06-14T00:15:12.267",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33135",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33135",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-08-09 20:15
Modified
2024-11-21 07:11
Summary
Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio:2012:update_5:*:*:*:*:*:*",
                     matchCriteriaId: "28CC44DA-DF23-400D-9299-7DF3EECD89E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio:2013:update_5:*:*:*:*:*:*",
                     matchCriteriaId: "4A820094-4660-4CFA-BAF1-ED4DBF45AD46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio:2015:update3:*:*:*:*:*:*",
                     matchCriteriaId: "62FE95C2-066B-491D-82BF-3EF173822B2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:15.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "6290EF90-AB91-4990-8D44-4F64F49AE133",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:16.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF6CF9B0-D279-42CD-A84D-48327F44422D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:16.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "99E7DAC9-17EF-40D4-AEEC-C24970B7190F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3393F97F-05CD-4B04-A6E1-3D914652C4E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB70FC91-06DB-4E92-9C0B-6FDE078F911B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Ejecución de Código Remota en Visual Studio. Este ID de CVE es diferente de CVE-2022-35777, CVE-2022-35825, CVE-2022-35826",
      },
   ],
   id: "CVE-2022-35827",
   lastModified: "2024-11-21T07:11:46.063",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2022-08-09T20:15:15.307",
   references: [
      {
         source: "secure@microsoft.com",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35827",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35827",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-04-11 21:15
Modified
2024-11-21 07:54
Summary
.NET DLL Hijacking Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FCFC39D-83CC-4BFA-9BF3-4F7B9675A354",
                     versionEndExcluding: "6.0.16",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "45897753-77F8-4ABA-BF4E-E68E851DF330",
                     versionEndExcluding: "7.0.5",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "06B7E408-A6EC-4556-A535-3F3340F314F7",
                     versionEndExcluding: "17.0.21",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "78A2B957-0654-45EF-ADE4-EEDA380D4583",
                     versionEndExcluding: "17.2.15",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CFF8AF1-4BEE-4CED-ADB5-8B7DE3C6A6E6",
                     versionEndExcluding: "17.4.7",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D305BC5-DF3E-45FE-9421-385D6A1E9EFC",
                     versionEndExcluding: "17.5.4",
                     versionStartIncluding: "17.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET DLL Hijacking Remote Code Execution Vulnerability",
      },
   ],
   id: "CVE-2023-28260",
   lastModified: "2024-11-21T07:54:42.873",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-04-11T21:15:25.493",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28260",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28260",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-10 21:15
Modified
2025-01-02 19:16
Summary
.NET and Visual Studio Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8F02D5C-61F1-4381-8D64-8BEB5CED0DC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "1DE0C8DD-9C73-4876-8193-068F18074B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_core:3.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "70BE107E-20A0-4998-A8ED-BCC414C6BDBF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EDDFE7B-C13D-4EF8-B288-0919CF7394F3",
                     versionEndIncluding: "16.0.11",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3393F97F-05CD-4B04-A6E1-3D914652C4E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "950638D8-6997-4058-8A9E-6153A7FC3B32",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                     matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Denegación de Servicio en .NET y Visual Studio. Este ID de CVE es diferente de CVE-2022-23267, CVE-2022-29145",
      },
   ],
   id: "CVE-2022-29117",
   lastModified: "2025-01-02T19:16:09.337",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
      ],
   },
   published: "2022-05-10T21:15:11.877",
   references: [
      {
         source: "secure@microsoft.com",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29117",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29117",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-08-09 20:15
Modified
2024-11-21 07:11
Summary
Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio:2012:update_5:*:*:*:*:*:*",
                     matchCriteriaId: "28CC44DA-DF23-400D-9299-7DF3EECD89E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio:2013:update_5:*:*:*:*:*:*",
                     matchCriteriaId: "4A820094-4660-4CFA-BAF1-ED4DBF45AD46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio:2015:update3:*:*:*:*:*:*",
                     matchCriteriaId: "62FE95C2-066B-491D-82BF-3EF173822B2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:15.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "6290EF90-AB91-4990-8D44-4F64F49AE133",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:16.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF6CF9B0-D279-42CD-A84D-48327F44422D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:16.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "99E7DAC9-17EF-40D4-AEEC-C24970B7190F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3393F97F-05CD-4B04-A6E1-3D914652C4E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB70FC91-06DB-4E92-9C0B-6FDE078F911B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Ejecución de Código Remota en Visual Studio. Este ID de CVE es diferente de CVE-2022-35777, CVE-2022-35825, CVE-2022-35827",
      },
   ],
   id: "CVE-2022-35826",
   lastModified: "2024-11-21T07:11:45.927",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2022-08-09T20:15:15.250",
   references: [
      {
         source: "secure@microsoft.com",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35826",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35826",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-14 21:15
Modified
2024-11-21 08:09
Summary
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
Impacted products
Vendor Product Version
microsoft .net_framework 2.0
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft .net_framework 3.0
microsoft windows_server_2008 -
microsoft .net_framework 3.5
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft .net_framework 3.5
microsoft .net_framework 4.6.2
microsoft .net_framework 4.7
microsoft .net_framework 4.7.1
microsoft .net_framework 4.7.2
microsoft windows_server_2016 -
microsoft windows_server_2019 -
microsoft .net_framework 3.5
microsoft .net_framework 4.7.2
microsoft windows_10_1507 -
microsoft windows_10_1507 -
microsoft windows_10_1809 -
microsoft windows_10_1809 -
microsoft windows_10_1809 -
microsoft windows_server_2016 -
microsoft windows_server_2019 -
microsoft .net_framework 3.5
microsoft .net_framework 4.8
microsoft windows_10_1809 -
microsoft windows_10_1809 -
microsoft windows_10_21h2 -
microsoft windows_10_21h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_11_21h2 -
microsoft windows_11_21h2 -
microsoft windows_server_2019 -
microsoft windows_server_2022 -
microsoft .net_framework 3.5
microsoft .net_framework 4.8.1
microsoft windows_10_1809 -
microsoft windows_10_1809 -
microsoft windows_10_21h2 -
microsoft windows_10_21h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_11_21h2 -
microsoft windows_11_21h2 -
microsoft windows_11_22h2 -
microsoft windows_11_22h2 -
microsoft windows_11_23h2 -
microsoft windows_11_23h2 -
microsoft windows_server_2022 -
microsoft .net_framework 3.5.1
microsoft windows_server_2008 r2
microsoft .net_framework 4.6.2
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft .net_framework 4.6.2
microsoft .net_framework 4.7
microsoft .net_framework 4.7.1
microsoft .net_framework 4.7.2
microsoft windows_server_2008 r2
microsoft windows_server_2008 r2
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft .net_framework 4.8
microsoft windows_10_1607 -
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft windows_server_2016 -
microsoft windows_server_2019 -
microsoft .net *
microsoft .net *
microsoft .net 8.0.0
microsoft .net 8.0.0
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "42A6DF09-B8E1-414D-97E7-453566055279",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "D400E856-2B2E-4CEA-8CA5-309FDF371CEA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
                     matchCriteriaId: "23317443-1968-4791-9F20-AD3B308A83D1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
                     matchCriteriaId: "23317443-1968-4791-9F20-AD3B308A83D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "734112B3-1383-4BE3-8721-C0F84566B764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "36B0E40A-84EF-4099-A395-75D6B8CDA196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
                     matchCriteriaId: "23317443-1968-4791-9F20-AD3B308A83D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "A045AC0A-471E-444C-B3B0-4CABC23E8CFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "73D24713-D897-408D-893B-77A61982597D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "306B7CE6-8239-4AED-9ED4-4C9F5B349F58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "345FCD64-D37B-425B-B64C-8B1640B7E850",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
                     matchCriteriaId: "23317443-1968-4791-9F20-AD3B308A83D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "306B7CE6-8239-4AED-9ED4-4C9F5B349F58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "345FCD64-D37B-425B-B64C-8B1640B7E850",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "8FC46499-DB6E-48BF-9334-85EE27AFE7AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "83A79DD6-E74E-419F-93F1-323B68502633",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "A9D54EE6-30AF-411C-A285-A4DCB6C6EC06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C230D3BF-7FCE-405C-B62E-B9190C995C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1FD62DCB-66D1-4CEA-828E-0BD302AC63CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "F2D718BD-C4B7-48DB-BE78-B9CA22F27DD0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "0C3552E0-F793-4CDD-965D-457495475805",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
                     matchCriteriaId: "23317443-1968-4791-9F20-AD3B308A83D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "934D4E46-12C1-41DC-A28C-A2C430E965E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "306B7CE6-8239-4AED-9ED4-4C9F5B349F58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "345FCD64-D37B-425B-B64C-8B1640B7E850",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "8FC46499-DB6E-48BF-9334-85EE27AFE7AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "83A79DD6-E74E-419F-93F1-323B68502633",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "A9D54EE6-30AF-411C-A285-A4DCB6C6EC06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C230D3BF-7FCE-405C-B62E-B9190C995C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1FD62DCB-66D1-4CEA-828E-0BD302AC63CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "F2D718BD-C4B7-48DB-BE78-B9CA22F27DD0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "0C3552E0-F793-4CDD-965D-457495475805",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "B2D24C54-F04F-4717-B614-FE67B3ED9DC0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "D5EC3F68-8F41-4F6B-B2E5-920322A4A321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "B0301BA0-81DB-4FC1-9BC3-EB48A56BC608",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "8E3C1327-F331-4448-A253-00EAC7428317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EDC4407-7E92-4E60-82F0-0C87D1860D3A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "734112B3-1383-4BE3-8721-C0F84566B764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "36B0E40A-84EF-4099-A395-75D6B8CDA196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x86:*",
                     matchCriteriaId: "EDCDBC70-9AB7-47F3-BD61-28860EEE5065",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC1456FF-8BB7-4D7D-A03E-22A2CDE8A094",
                     versionEndExcluding: "6.0.25",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "73A23066-A84B-4E76-B0ED-63BA1A9C1263",
                     versionEndExcluding: "7.0.14",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:8.0.0:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "5F3CB225-CDF6-4730-A20C-891AB87CBB9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:8.0.0:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "6F9C3F37-0A3B-45D4-86B1-B42FDA8D8EA7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EABB880-0CBA-45CD-A197-CB1EE1710061",
                     versionEndExcluding: "17.2.22",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCC513DB-075E-4D09-B289-902F3C16BFB7",
                     versionEndExcluding: "17.4.14",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "56738F2F-8802-4ADB-AC7C-9BAD67626C75",
                     versionEndExcluding: "17.6.10",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD1B0CE9-6A87-47DC-A27B-9587A6B5B45D",
                     versionEndExcluding: "17.7.7",
                     versionStartIncluding: "17.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de elevación de privilegios en .NET, .NET Framework y Visual Studio",
      },
   ],
   id: "CVE-2023-36049",
   lastModified: "2024-11-21T08:09:14.527",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 7.6,
               baseSeverity: "HIGH",
               confidentialityImpact: "LOW",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 4.7,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-14T21:15:10.083",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36049",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36049",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-04-09 17:15
Modified
2025-01-14 20:48
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "453652D6-37A7-49BC-8660-330EADA8CCDD",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "422283AD-E25A-4779-BB9A-0E496BFAC524",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "9BDD3D5D-70D5-4767-95DC-25873774B536",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "C8B405E1-CC25-4883-A26D-4A4237E43FB0",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "7236DD21-703E-4359-88AD-E68C3B1D33FE",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "948FC47B-E7FE-404A-A747-18DA61D35A3F",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "DD9CBEE2-6BF0-45E5-8DAA-2749344ECCFE",
                     versionEndExcluding: "15.0.2110.4",
                     versionStartIncluding: "15.0.2000.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C9C35D21-EE02-4562-8196-7A4781DECF06",
                     versionEndExcluding: "15.0.4360.2",
                     versionStartIncluding: "15.0.4003.23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "6A943249-37AA-4E3B-A074-7E87EC4CD040",
                     versionEndExcluding: "16.0.1115.1",
                     versionStartIncluding: "16.0.1000.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "2ADF9550-5FAA-4696-9F59-8D235B989541",
                     versionEndExcluding: "16.0.4120.1",
                     versionStartIncluding: "16.0.4003.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B69AEE86-A505-42EA-ADD3-FB0F6346C2FA",
                     versionEndExcluding: "16.11.35",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8133E65A-AE80-4266-A445-265908DD8E21",
                     versionEndExcluding: "17.4.18",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "35FAD418-A4C1-40C3-8F08-A08CA1190BB0",
                     versionEndExcluding: "17.6.14",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "39E176F7-8E26-4175-98FE-99288ADD2DA3",
                     versionEndExcluding: "17.8.9",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2188B97-2B2C-445A-B667-2C3269B94959",
                     versionEndExcluding: "17.9.6",
                     versionStartIncluding: "17.9.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código del controlador ODBC de Microsoft para SQL Server",
      },
   ],
   id: "CVE-2024-28933",
   lastModified: "2025-01-14T20:48:53.627",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-04-09T17:15:54.503",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28933",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28933",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-191",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2025-01-14 18:15
Modified
2025-02-05 20:07
Summary
.NET Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:9.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DFE5320-88E8-42C2-BC1C-E402FE71ECBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:7.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "55470C2B-D908-46C8-97F4-2ABFF4DD73F4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C373831-8981-462F-8A57-9C71D1839052",
                     versionEndExcluding: "17.6.22",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CA6DD18-569B-449D-82FF-4BE3A57E7150",
                     versionEndExcluding: "17.8.17",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDA7CDF2-DB37-4C34-9D5F-E09B34B83B1A",
                     versionEndExcluding: "17.10.10",
                     versionStartIncluding: "17.10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CDB41EA-38E1-4325-8DE7-27E187C1695B",
                     versionEndExcluding: "17.12.4",
                     versionStartIncluding: "17.12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código en .NET",
      },
   ],
   id: "CVE-2025-21171",
   lastModified: "2025-02-05T20:07:01.797",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.6,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2025-01-14T18:15:30.100",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21171",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-122",
            },
         ],
         source: "secure@microsoft.com",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-02-13 18:15
Modified
2024-11-21 08:54
Summary
.NET Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "152AECFB-BB7E-40FC-B9FF-6CAA908B34E4",
                     versionEndExcluding: "6.0.27",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBAFB920-6975-4E01-B75B-5AB6991281CD",
                     versionEndExcluding: "7.0.16",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BDF34C1-9C87-4EAB-8DBD-49CF6ED87522",
                     versionEndExcluding: "8.0.2",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "474DB3BE-DF4D-4F8B-B4ED-8D2EECBED45F",
                     versionEndExcluding: "17.4.16",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDFA874A-0DB4-41F3-9122-29F1842B951F",
                     versionEndExcluding: "17.6.12",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "96B56F8A-097E-4A57-9CA9-5255CE3B9924",
                     versionEndExcluding: "17.8.7",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de denegación de servicio de .NET",
      },
   ],
   id: "CVE-2024-21386",
   lastModified: "2024-11-21T08:54:15.270",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-02-13T18:15:56.737",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21386",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21386",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-14 22:15
Modified
2024-11-21 08:09
Summary
ASP.NET Core Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EABB880-0CBA-45CD-A197-CB1EE1710061",
                     versionEndExcluding: "17.2.22",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCC513DB-075E-4D09-B289-902F3C16BFB7",
                     versionEndExcluding: "17.4.14",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "56738F2F-8802-4ADB-AC7C-9BAD67626C75",
                     versionEndExcluding: "17.6.10",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD1B0CE9-6A87-47DC-A27B-9587A6B5B45D",
                     versionEndExcluding: "17.7.7",
                     versionStartIncluding: "17.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:8.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "71FB0BA0-0D9E-4420-8109-EDB9CF2D69AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:8.0.0:preview.1:*:*:*:*:*:*",
                     matchCriteriaId: "BB3DD9A8-684A-4D3C-AAC1-795A5154B8FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:8.0.0:preview.2:*:*:*:*:*:*",
                     matchCriteriaId: "CF27FE4D-4019-44CB-B86A-0F6EB22043EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:8.0.0:preview.3:*:*:*:*:*:*",
                     matchCriteriaId: "2355C9C3-17D4-4024-B60A-55E698139269",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:8.0.0:preview.4:*:*:*:*:*:*",
                     matchCriteriaId: "4BF4A874-DE47-4662-82E8-899258ABCAA4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:8.0.0:preview.5:*:*:*:*:*:*",
                     matchCriteriaId: "A088E6AE-B04B-4BF2-9710-875767A17644",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:8.0.0:preview.6:*:*:*:*:*:*",
                     matchCriteriaId: "C499F62B-EE47-4F90-8E0C-BE5B3A95E6EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:8.0.0:preview.7:*:*:*:*:*:*",
                     matchCriteriaId: "D9BE19EE-D1C3-4688-A614-0E906F949768",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:8.0.0:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "5F3CB225-CDF6-4730-A20C-891AB87CBB9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:8.0.0:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "6F9C3F37-0A3B-45D4-86B1-B42FDA8D8EA7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "ASP.NET Core Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de denegación de servicio de ASP.NET Core",
      },
   ],
   id: "CVE-2023-36038",
   lastModified: "2024-11-21T08:09:13.453",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.2,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 4.2,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-14T22:15:28.733",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36038",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36038",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-10-08 18:15
Modified
2025-03-28 15:15
Summary
.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
Impacted products
Vendor Product Version
microsoft .net_framework 3.5
microsoft .net_framework 4.8.1
microsoft windows_10_21h2 -
microsoft windows_10_22h2 -
microsoft windows_11_22h2 -
microsoft windows_11_23h2 -
microsoft windows_11_24h2 -
microsoft windows_server_2022 *
microsoft windows_server_2022_23h2 *
microsoft .net_framework 3.5
microsoft .net_framework 4.8
microsoft windows_10_1809 *
microsoft windows_10_21h2 *
microsoft windows_10_22h2 *
microsoft windows_11_21h2 *
microsoft windows_server_2019 *
microsoft windows_server_2022 *
microsoft .net_framework 3.5
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft windows_server_2012 *
microsoft windows_server_2012 r2
microsoft .net_framework 4.8
microsoft windows_10_1607 *
microsoft windows_10_1607 *
microsoft windows_server_2008 r2
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft windows_server_2016 *
microsoft .net_framework 3.5
microsoft .net_framework 4.7.2
microsoft windows_10_1607 *
microsoft windows_10_1607 *
microsoft windows_10_1809 *
microsoft windows_server_2016 *
microsoft windows_server_2019 *
microsoft .net_framework 3.5.1
microsoft windows_server_2008 r2
microsoft .net_framework 4.6.2
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft .net_framework 4.6.2
microsoft .net_framework 4.7
microsoft .net_framework 4.7.1
microsoft .net_framework 4.7.2
microsoft windows_server_2008 r2
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft .net_framework 4.6
microsoft .net_framework 4.6.2
microsoft windows_10_1507 -
microsoft .net_framework 3.0
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft .net_framework 2.0
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft .net *
microsoft .net *
apple macos -
linux linux_kernel -
microsoft windows -
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
                     matchCriteriaId: "23317443-1968-4791-9F20-AD3B308A83D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "934D4E46-12C1-41DC-A28C-A2C430E965E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F513002-D8C1-4D3A-9F79-4B52498F67E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4793BFB-2E4E-4067-87A5-4B8749025CA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "42D329B2-432D-4029-87EB-4C3C5F55CD95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_24h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A529CED5-0DF0-4203-85C0-894CAF37E159",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F0241B0-855A-489C-9AAE-68BC2556F24D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B822942-B429-406C-A13A-A2379AA952CF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
                     matchCriteriaId: "23317443-1968-4791-9F20-AD3B308A83D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E2A7014-8078-4C40-91E3-ACA60A98AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "979081E3-FB60-43E0-BF86-ED301E7EF25C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F7487B8-BE4D-4707-9E20-39840A260831",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "47D0AB10-CD2F-4500-A4D6-CC2BA724036C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E4E76DC-838A-46D7-BC09-E2C149699050",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F0241B0-855A-489C-9AAE-68BC2556F24D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
                     matchCriteriaId: "23317443-1968-4791-9F20-AD3B308A83D1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "AA1CCA3D-299D-4BCD-8565-98083C40525C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*",
                     matchCriteriaId: "8968BAC8-A1DB-4F88-89F8-4BE47919C247",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "D00F295B-6ECF-43C4-BD71-98F835CCDB0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1648C361-E25C-42FE-8543-03DE56100201",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF6437F9-6631-49D3-A6C2-62329E278E31",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
                     matchCriteriaId: "23317443-1968-4791-9F20-AD3B308A83D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "D00F295B-6ECF-43C4-BD71-98F835CCDB0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1648C361-E25C-42FE-8543-03DE56100201",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E2A7014-8078-4C40-91E3-ACA60A98AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF6437F9-6631-49D3-A6C2-62329E278E31",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E4E76DC-838A-46D7-BC09-E2C149699050",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EDC4407-7E92-4E60-82F0-0C87D1860D3A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "734112B3-1383-4BE3-8721-C0F84566B764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "36B0E40A-84EF-4099-A395-75D6B8CDA196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "280FE663-23BE-45D2-9B31-5F577E390B48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "542DAEEC-73CC-46C6-A630-BF474A3446AC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "D400E856-2B2E-4CEA-8CA5-309FDF371CEA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "42A6DF09-B8E1-414D-97E7-453566055279",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA23E158-EEDE-46D9-ADA2-43A07949A326",
                     versionEndExcluding: "6.0.35",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D977AC32-7583-44F0-B48D-ACB001DA164A",
                     versionEndExcluding: "8.0.10",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8CF89C8-6076-458E-B27E-B88A6A8765FC",
                     versionEndExcluding: "17.6.20",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "81CBEFEE-6C2B-4341-9499-42385C88E5CD",
                     versionEndExcluding: "17.8.15",
                     versionStartIncluding: "17.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "68935496-FE9F-4E64-95C7-4DCAA4681F41",
                     versionEndExcluding: "17.10.8",
                     versionStartIncluding: "17.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FB9AE6A-F671-423C-9C83-0A031067F948",
                     versionEndExcluding: "17.11.5",
                     versionStartIncluding: "17.11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de denegación de servicio en .NET, .NET Framework y Visual Studio",
      },
   ],
   id: "CVE-2024-43484",
   lastModified: "2025-03-28T15:15:44.823",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
      ],
   },
   published: "2024-10-08T18:15:10.633",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43484",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20250328-0007/",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-407",
            },
            {
               lang: "en",
               value: "CWE-789",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-07-09 17:15
Modified
2024-11-21 09:11
Summary
.NET and Visual Studio Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2260CD28-E80F-4FFC-B8DA-44CC726FBD83",
                     versionEndIncluding: "8.0.7",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9079F629-6958-469E-AF83-8030B145E354",
                     versionEndExcluding: "17.4.21",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1C74913-B238-4B3C-8F2D-37FFCCAB5E9E",
                     versionEndExcluding: "17.6.17",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4D4B43A-9B2F-4FCC-8A24-11F102A42BCB",
                     versionEndIncluding: "17.8.12",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4CAA048-BCAA-4CBA-81DA-E8748C441017",
                     versionEndIncluding: "17.10.4",
                     versionStartIncluding: "17.10.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de denegación de servicio en .NET Core y Visual Studio",
      },
   ],
   id: "CVE-2024-30105",
   lastModified: "2024-11-21T09:11:16.770",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-07-09T17:15:17.200",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30105",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30105",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-06-11 17:15
Modified
2024-11-21 09:07
Summary
Visual Studio Elevation of Privilege Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEA12D36-333A-4AD8-AECA-7FC85780EC03",
                     versionEndExcluding: "15.9.63",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB2A31FC-2741-4500-8EA2-B67A1025402D",
                     versionEndExcluding: "16.11.37",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6993B949-BB1A-4341-85D4-CB79406A755E",
                     versionEndExcluding: "17.4.20",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7187D7EB-112B-4240-BB55-9443C4397263",
                     versionEndExcluding: "17.6.16",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "85BA04C4-11BD-4038-9B7C-93AE02FAF03C",
                     versionEndExcluding: "17.8.11",
                     versionStartIncluding: "17.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "70C6E63C-4CF8-4A54-A07E-88FE56A9045B",
                     versionEndExcluding: "17.10.2",
                     versionStartIncluding: "17.10",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Elevation of Privilege Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de elevación de privilegios en Visual Studio",
      },
   ],
   id: "CVE-2024-29060",
   lastModified: "2024-11-21T09:07:28.380",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L",
               version: "3.1",
            },
            exploitabilityScore: 1.2,
            impactScore: 5.5,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-06-11T17:15:51.383",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29060",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29060",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-284",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-11-12 18:15
Modified
2024-11-19 19:59
Summary
.NET and Visual Studio Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:9.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DFE5320-88E8-42C2-BC1C-E402FE71ECBB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "480EF56E-9720-4ABD-BE13-CD68F6300482",
                     versionEndExcluding: "17.6.21",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3974951-EE1A-47CD-B1AB-389C4BDADEB0",
                     versionEndExcluding: "17.8.16",
                     versionStartIncluding: "17.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F66E9930-468D-4637-9FAF-35C7288C6E4A",
                     versionEndIncluding: "17.10.9",
                     versionStartIncluding: "17.10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FCE50CB-B8BC-4C62-86AC-4B5DC0F0A8BA",
                     versionEndExcluding: "17.11.6",
                     versionStartIncluding: "17.11.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de denegación de servicio en .NET y Visual Studio",
      },
   ],
   id: "CVE-2024-43499",
   lastModified: "2024-11-19T19:59:24.387",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-11-12T18:15:24.363",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43499",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-409",
            },
            {
               lang: "en",
               value: "CWE-606",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-01-09 18:15
Modified
2024-11-21 08:52
Summary
Visual Studio Elevation of Privilege Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio:2015:update3:*:*:*:*:*:*",
                     matchCriteriaId: "62FE95C2-066B-491D-82BF-3EF173822B2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A3FE761-3245-4763-9FC8-FA81B2AFC945",
                     versionEndExcluding: "15.9.59",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEAEA929-9BCB-463F-BFD7-E56E9BEB8AB3",
                     versionEndExcluding: "16.11.33",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "05D999A1-AB25-4642-8D94-07AD00FEE820",
                     versionEndExcluding: "17.2.23",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE1C61FB-CC6B-4D88-8B7F-FFE9D1238A6C",
                     versionEndExcluding: "17.4.15",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9C0A3-7D62-40CE-8493-514CB313F72C",
                     versionEndExcluding: "17.6.11",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Elevation of Privilege Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de elevación de privilegios en Visual Studio",
      },
   ],
   id: "CVE-2024-20656",
   lastModified: "2024-11-21T08:52:51.190",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-01-09T18:15:48.490",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20656",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20656",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-59",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-02-14 21:15
Modified
2024-11-21 07:43
Summary
Visual Studio Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "832BAB52-5118-4E00-955D-BF3716B288D0",
                     versionEndExcluding: "15.9.52",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "821BE24D-9EEE-42FE-B4E7-5C682F6B34C4",
                     versionEndExcluding: "16.11.24",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AA616AA-25E5-4943-A614-99FF6DFF260E",
                     versionEndExcluding: "17.0.19",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "191993E5-B343-45A6-B485-F45F5D8E924D",
                     versionEndExcluding: "17.2.13",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F16E4665-E579-4211-92C0-D8058F73A359",
                     versionEndExcluding: "17.4.5",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Denial of Service Vulnerability",
      },
   ],
   id: "CVE-2023-21567",
   lastModified: "2024-11-21T07:43:06.047",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.6,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.3,
            impactScore: 4.2,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-02-14T21:15:11.157",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21567",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21567",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-59",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-10-10 18:15
Modified
2024-11-21 08:13
Summary
Microsoft QUIC Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DF7ECF6-178D-433C-AA21-BAE9EF248F37",
                     versionEndExcluding: "7.0.12",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "721D09CB-C00B-4436-A5DB-4C4E53ECBE5F",
                     versionEndExcluding: "17.2.20",
                     versionStartIncluding: "17.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "22ACD519-DFE4-4BB4-B0F7-9DECF6F7332F",
                     versionEndExcluding: "17.4.12",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B09DBD5A-9F00-43FF-8B9B-17F286A92402",
                     versionEndExcluding: "17.6.8",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C561F14F-F4BF-4473-BD01-963A55F87E21",
                     versionEndExcluding: "17.7.5",
                     versionStartIncluding: "17.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6A36795-0238-45C9-ABE6-3DCCF751915B",
                     versionEndExcluding: "10.0.22621.2428",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft QUIC Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de denegación de servicio en Microsoft QUIC",
      },
   ],
   id: "CVE-2023-38171",
   lastModified: "2024-11-21T08:13:00.467",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-10-10T18:15:18.087",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38171",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38171",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-08-08 18:15
Modified
2024-11-21 08:13
Summary
.NET Core and Visual Studio Denial of Service Vulnerability
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "1DE0C8DD-9C73-4876-8193-068F18074B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DADAE1CA-1303-4B24-A9EC-E79A83088E49",
                     versionEndExcluding: "17.2.18",
                     versionStartIncluding: "17.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2A151F0-EE6A-4D89-BF83-74CCAA76E373",
                     versionEndExcluding: "17.4.10",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET Core and Visual Studio Denial of Service Vulnerability",
      },
   ],
   id: "CVE-2023-38178",
   lastModified: "2024-11-21T08:13:01.407",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-08T18:15:22.697",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-10 21:15
Modified
2025-01-02 19:15
Summary
.NET and Visual Studio Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8F02D5C-61F1-4381-8D64-8BEB5CED0DC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "1DE0C8DD-9C73-4876-8193-068F18074B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_core:3.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "70BE107E-20A0-4998-A8ED-BCC414C6BDBF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "38B049EF-F1D9-42C5-8226-F28DD68D0106",
                     versionEndExcluding: "7.0.11",
                     versionStartIncluding: "7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "087F1FA2-3A69-4C63-8BC3-A131C4DD2DC8",
                     versionEndExcluding: "7.2.4",
                     versionStartIncluding: "7.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45D4D8-318F-444E-A07A-274C1DD9CF4C",
                     versionEndExcluding: "16.9.21",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2508F0E2-89CA-44CD-B4BA-A5D49C46BA11",
                     versionEndExcluding: "16.11.14",
                     versionStartIncluding: "16.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3393F97F-05CD-4B04-A6E1-3D914652C4E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "950638D8-6997-4058-8A9E-6153A7FC3B32",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                     matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Denegación de Servicio en .NET y Visual Studio. Este ID de CVE es diferente de CVE-2022-29117, CVE-2022-29145",
      },
   ],
   id: "CVE-2022-23267",
   lastModified: "2025-01-02T19:15:39.870",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
      ],
   },
   published: "2022-05-10T21:15:09.853",
   references: [
      {
         source: "secure@microsoft.com",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23267",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23267",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-10 21:15
Modified
2025-01-02 19:16
Summary
.NET and Visual Studio Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8F02D5C-61F1-4381-8D64-8BEB5CED0DC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:6.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6CE8612-0E01-406F-B5E7-8C7F5451E2FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_core:3.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "70BE107E-20A0-4998-A8ED-BCC414C6BDBF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45D4D8-318F-444E-A07A-274C1DD9CF4C",
                     versionEndExcluding: "16.9.21",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2508F0E2-89CA-44CD-B4BA-A5D49C46BA11",
                     versionEndExcluding: "16.11.14",
                     versionStartIncluding: "16.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C44DF295-0388-4FEE-A4A8-BAB75834C280",
                     versionEndExcluding: "17.1.7",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                     matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Denegación de Servicio en .NET y Visual Studio. Este ID de CVE es diferente de CVE-2022-23267, CVE-2022-29117",
      },
   ],
   id: "CVE-2022-29145",
   lastModified: "2025-01-02T19:16:12.750",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
      ],
   },
   published: "2022-05-10T21:15:13.077",
   references: [
      {
         source: "secure@microsoft.com",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29145",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29145",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-04-11 21:15
Modified
2024-11-21 07:54
Summary
Visual Studio Spoofing Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DA31D6C-5369-40DC-99F8-90B997461BE6",
                     versionEndExcluding: "15.9.54",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6B51259-1136-4B2D-8E02-76EF121FE9A9",
                     versionEndExcluding: "16.11.26",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "06B7E408-A6EC-4556-A535-3F3340F314F7",
                     versionEndExcluding: "17.0.21",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:-:*:*",
                     matchCriteriaId: "16287ED1-84CC-42D7-888D-9F1C5278A93F",
                     versionEndExcluding: "17.2.15",
                     versionStartIncluding: "17.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:-:*:*",
                     matchCriteriaId: "C0075BF4-95C0-491C-AA2C-A7013C47EFDA",
                     versionEndExcluding: "17.4.7",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:-:*:*",
                     matchCriteriaId: "B7D4F983-B988-419C-9C94-E567E94A179E",
                     versionEndExcluding: "17.5.4",
                     versionStartIncluding: "17.5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Spoofing Vulnerability",
      },
   ],
   id: "CVE-2023-28299",
   lastModified: "2024-11-21T07:54:47.197",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-04-11T21:15:27.663",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28299",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28299",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-04-09 17:15
Modified
2025-01-14 20:50
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "453652D6-37A7-49BC-8660-330EADA8CCDD",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "422283AD-E25A-4779-BB9A-0E496BFAC524",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "9BDD3D5D-70D5-4767-95DC-25873774B536",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "C8B405E1-CC25-4883-A26D-4A4237E43FB0",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "7236DD21-703E-4359-88AD-E68C3B1D33FE",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "948FC47B-E7FE-404A-A747-18DA61D35A3F",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "DD9CBEE2-6BF0-45E5-8DAA-2749344ECCFE",
                     versionEndExcluding: "15.0.2110.4",
                     versionStartIncluding: "15.0.2000.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C9C35D21-EE02-4562-8196-7A4781DECF06",
                     versionEndExcluding: "15.0.4360.2",
                     versionStartIncluding: "15.0.4003.23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "6A943249-37AA-4E3B-A074-7E87EC4CD040",
                     versionEndExcluding: "16.0.1115.1",
                     versionStartIncluding: "16.0.1000.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "2ADF9550-5FAA-4696-9F59-8D235B989541",
                     versionEndExcluding: "16.0.4120.1",
                     versionStartIncluding: "16.0.4003.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B69AEE86-A505-42EA-ADD3-FB0F6346C2FA",
                     versionEndExcluding: "16.11.35",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8133E65A-AE80-4266-A445-265908DD8E21",
                     versionEndExcluding: "17.4.18",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "35FAD418-A4C1-40C3-8F08-A08CA1190BB0",
                     versionEndExcluding: "17.6.14",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "39E176F7-8E26-4175-98FE-99288ADD2DA3",
                     versionEndExcluding: "17.8.9",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2188B97-2B2C-445A-B667-2C3269B94959",
                     versionEndExcluding: "17.9.6",
                     versionStartIncluding: "17.9.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código del controlador ODBC de Microsoft para SQL Server",
      },
   ],
   id: "CVE-2024-28936",
   lastModified: "2025-01-14T20:50:19.147",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-04-09T17:15:55.193",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28936",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28936",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-14 15:15
Modified
2024-11-21 07:48
Summary
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
microsoft .net_framework 4.8
microsoft windows_10_1607 -
microsoft windows_10_1607 -
microsoft windows_server_2008 r2
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft windows_server_2016 -
microsoft .net_framework 4.6.2
microsoft .net_framework 4.7
microsoft .net_framework 4.7.1
microsoft .net_framework 4.7.2
microsoft windows_server_2008 r2
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft .net_framework 4.6.2
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft .net_framework 3.5.1
microsoft windows_server_2008 r2
microsoft .net_framework 3.5
microsoft .net_framework 4.6.2
microsoft windows_10_1507 -
microsoft windows_10_1507 -
microsoft .net_framework 3.5
microsoft .net_framework 4.8.1
microsoft windows_10_1607 -
microsoft windows_10_1607 -
microsoft windows_10_21h2 -
microsoft windows_10_21h2 -
microsoft windows_10_21h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_11_21h2 -
microsoft windows_11_21h2 -
microsoft windows_11_22h2 -
microsoft windows_11_22h2 -
microsoft windows_server_2022 -
microsoft .net_framework 3.5
microsoft .net_framework 4.8
microsoft windows_10_1607 -
microsoft windows_10_1607 -
microsoft windows_10_1809 -
microsoft windows_10_1809 -
microsoft windows_10_21h2 -
microsoft windows_10_21h2 -
microsoft windows_10_21h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_11_21h2 -
microsoft windows_11_21h2 -
microsoft windows_11_22h2 -
microsoft windows_11_22h2 -
microsoft windows_server_2019 -
microsoft windows_server_2022 -
microsoft .net_framework 3.5
microsoft .net_framework 4.7.2
microsoft windows_10_1809 -
microsoft windows_10_1809 -
microsoft windows_server_2019 -
microsoft .net_framework 3.5
microsoft .net_framework 4.6.2
microsoft .net_framework 4.7
microsoft .net_framework 4.7.1
microsoft .net_framework 4.7.2
microsoft windows_10_1607 -
microsoft windows_10_1607 -
microsoft windows_server_2016 -
microsoft .net_framework 3.5
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft .net_framework 3.0
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft .net_framework 2.0
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft .net 6.0.0
microsoft .net 7.0.0
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "0A1BC97A-263E-4291-8AEF-02EE4E6031E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "734112B3-1383-4BE3-8721-C0F84566B764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "36B0E40A-84EF-4099-A395-75D6B8CDA196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EDC4407-7E92-4E60-82F0-0C87D1860D3A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "A045AC0A-471E-444C-B3B0-4CABC23E8CFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "934D4E46-12C1-41DC-A28C-A2C430E965E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "0A1BC97A-263E-4291-8AEF-02EE4E6031E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "8FC46499-DB6E-48BF-9334-85EE27AFE7AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "83A79DD6-E74E-419F-93F1-323B68502633",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "61959ACC-B608-4556-92AF-4D94B338907A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "A9D54EE6-30AF-411C-A285-A4DCB6C6EC06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C230D3BF-7FCE-405C-B62E-B9190C995C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1FD62DCB-66D1-4CEA-828E-0BD302AC63CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "F2D718BD-C4B7-48DB-BE78-B9CA22F27DD0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "0C3552E0-F793-4CDD-965D-457495475805",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "B2D24C54-F04F-4717-B614-FE67B3ED9DC0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "D5EC3F68-8F41-4F6B-B2E5-920322A4A321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "0A1BC97A-263E-4291-8AEF-02EE4E6031E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "306B7CE6-8239-4AED-9ED4-4C9F5B349F58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "345FCD64-D37B-425B-B64C-8B1640B7E850",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "8FC46499-DB6E-48BF-9334-85EE27AFE7AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "83A79DD6-E74E-419F-93F1-323B68502633",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "61959ACC-B608-4556-92AF-4D94B338907A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "A9D54EE6-30AF-411C-A285-A4DCB6C6EC06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C230D3BF-7FCE-405C-B62E-B9190C995C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1FD62DCB-66D1-4CEA-828E-0BD302AC63CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "F2D718BD-C4B7-48DB-BE78-B9CA22F27DD0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "0C3552E0-F793-4CDD-965D-457495475805",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "B2D24C54-F04F-4717-B614-FE67B3ED9DC0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "D5EC3F68-8F41-4F6B-B2E5-920322A4A321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "306B7CE6-8239-4AED-9ED4-4C9F5B349F58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "345FCD64-D37B-425B-B64C-8B1640B7E850",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "734112B3-1383-4BE3-8721-C0F84566B764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "36B0E40A-84EF-4099-A395-75D6B8CDA196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "0A1BC97A-263E-4291-8AEF-02EE4E6031E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "D400E856-2B2E-4CEA-8CA5-309FDF371CEA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "42A6DF09-B8E1-414D-97E7-453566055279",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "1DE0C8DD-9C73-4876-8193-068F18074B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4E2C6C0-FD91-40D9-B1A4-C1C348A156C7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1F98BC-0D82-4AEB-9E1E-D67325E99385",
                     versionEndExcluding: "17.0.22",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6B0B496-BC41-4F9D-9A28-AE7664B5C77D",
                     versionEndExcluding: "17.2.16",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC861E65-1682-4E99-8A7B-F4A31DDC0198",
                     versionEndExcluding: "17.4.8",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51DB90D6-C1C4-43B9-8B37-696CB361F37F",
                     versionEndExcluding: "17.6.3",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
      },
   ],
   id: "CVE-2023-24895",
   lastModified: "2024-11-21T07:48:43.507",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-06-14T15:15:09.433",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24895",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24895",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-04-11 21:15
Modified
2024-11-21 07:54
Summary
Visual Studio Information Disclosure Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6B51259-1136-4B2D-8E02-76EF121FE9A9",
                     versionEndExcluding: "16.11.26",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "06B7E408-A6EC-4556-A535-3F3340F314F7",
                     versionEndExcluding: "17.0.21",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "78A2B957-0654-45EF-ADE4-EEDA380D4583",
                     versionEndExcluding: "17.2.15",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CFF8AF1-4BEE-4CED-ADB5-8B7DE3C6A6E6",
                     versionEndExcluding: "17.4.7",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D305BC5-DF3E-45FE-9421-385D6A1E9EFC",
                     versionEndExcluding: "17.5.4",
                     versionStartIncluding: "17.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Information Disclosure Vulnerability",
      },
   ],
   id: "CVE-2023-28263",
   lastModified: "2024-11-21T07:54:43.273",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Secondary",
         },
      ],
   },
   published: "2023-04-11T21:15:25.627",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28263",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28263",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-170",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-11-12 18:15
Modified
2024-11-19 20:01
Severity ?
Summary
.NET and Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:9.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DFE5320-88E8-42C2-BC1C-E402FE71ECBB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "480EF56E-9720-4ABD-BE13-CD68F6300482",
                     versionEndExcluding: "17.6.21",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3974951-EE1A-47CD-B1AB-389C4BDADEB0",
                     versionEndExcluding: "17.8.16",
                     versionStartIncluding: "17.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B85CEE4B-546D-4DBF-8673-96859149F05F",
                     versionEndExcluding: "17.10.9",
                     versionStartIncluding: "17.10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FCE50CB-B8BC-4C62-86AC-4B5DC0F0A8BA",
                     versionEndExcluding: "17.11.6",
                     versionStartIncluding: "17.11.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código en .NET y Visual Studio",
      },
   ],
   id: "CVE-2024-43498",
   lastModified: "2024-11-19T20:01:04.877",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-11-12T18:15:24.110",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43498",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-04-09 17:15
Modified
2025-01-14 20:52
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "453652D6-37A7-49BC-8660-330EADA8CCDD",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "422283AD-E25A-4779-BB9A-0E496BFAC524",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "9BDD3D5D-70D5-4767-95DC-25873774B536",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "C8B405E1-CC25-4883-A26D-4A4237E43FB0",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "7236DD21-703E-4359-88AD-E68C3B1D33FE",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "948FC47B-E7FE-404A-A747-18DA61D35A3F",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "DD9CBEE2-6BF0-45E5-8DAA-2749344ECCFE",
                     versionEndExcluding: "15.0.2110.4",
                     versionStartIncluding: "15.0.2000.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C9C35D21-EE02-4562-8196-7A4781DECF06",
                     versionEndExcluding: "15.0.4360.2",
                     versionStartIncluding: "15.0.4003.23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "6A943249-37AA-4E3B-A074-7E87EC4CD040",
                     versionEndExcluding: "16.0.1115.1",
                     versionStartIncluding: "16.0.1000.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "2ADF9550-5FAA-4696-9F59-8D235B989541",
                     versionEndExcluding: "16.0.4120.1",
                     versionStartIncluding: "16.0.4003.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B69AEE86-A505-42EA-ADD3-FB0F6346C2FA",
                     versionEndExcluding: "16.11.35",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8133E65A-AE80-4266-A445-265908DD8E21",
                     versionEndExcluding: "17.4.18",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "35FAD418-A4C1-40C3-8F08-A08CA1190BB0",
                     versionEndExcluding: "17.6.14",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "39E176F7-8E26-4175-98FE-99288ADD2DA3",
                     versionEndExcluding: "17.8.9",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2188B97-2B2C-445A-B667-2C3269B94959",
                     versionEndExcluding: "17.9.6",
                     versionStartIncluding: "17.9.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código del controlador ODBC de Microsoft para SQL Server",
      },
   ],
   id: "CVE-2024-28931",
   lastModified: "2025-01-14T20:52:05.480",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-04-09T17:15:54.097",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28931",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28931",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-14 00:15
Modified
2024-11-21 08:04
Summary
Visual Studio Information Disclosure Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio:2015:update3:*:*:*:*:*:*",
                     matchCriteriaId: "62FE95C2-066B-491D-82BF-3EF173822B2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio:2015:update5:*:*:*:*:*:*",
                     matchCriteriaId: "647EBBAA-C731-4954-A62C-2B1AAFB1061C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB877090-2FA4-4E6A-99D1-70375A3AD90E",
                     versionEndExcluding: "15.8",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "979A6A3D-64F8-4099-A00D-16F5BAC2BD79",
                     versionEndExcluding: "15.9.55",
                     versionStartIncluding: "15.9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "26472C42-CDB4-4176-B10B-3BF26F5030E3",
                     versionEndIncluding: "16.10",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFF8A760-E6E1-483D-A955-102A8D82B62C",
                     versionEndExcluding: "16.11.27",
                     versionStartIncluding: "16.11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1F98BC-0D82-4AEB-9E1E-D67325E99385",
                     versionEndExcluding: "17.0.22",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6B0B496-BC41-4F9D-9A28-AE7664B5C77D",
                     versionEndExcluding: "17.2.16",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC861E65-1682-4E99-8A7B-F4A31DDC0198",
                     versionEndExcluding: "17.4.8",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51DB90D6-C1C4-43B9-8B37-696CB361F37F",
                     versionEndExcluding: "17.6.3",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Information Disclosure Vulnerability",
      },
   ],
   id: "CVE-2023-33139",
   lastModified: "2024-11-21T08:04:58.090",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-06-14T00:15:12.380",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33139",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33139",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-09-12 17:15
Modified
2024-11-21 08:10
Summary
Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EDC4407-7E92-4E60-82F0-0C87D1860D3A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "42A6DF09-B8E1-414D-97E7-453566055279",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "D400E856-2B2E-4CEA-8CA5-309FDF371CEA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "5F422A8C-2C4E-42C8-B420-E0728037E15C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E332666-2E03-468E-BC30-299816D6E8ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F513002-D8C1-4D3A-9F79-4B52498F67E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB4AE761-6FAC-4000-A63D-42CE3FAB8412",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "934D4E46-12C1-41DC-A28C-A2C430E965E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F513002-D8C1-4D3A-9F79-4B52498F67E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB4AE761-6FAC-4000-A63D-42CE3FAB8412",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4793BFB-2E4E-4067-87A5-4B8749025CA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "61019899-D7AF-46E4-A72C-D189180F66AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E332666-2E03-468E-BC30-299816D6E8ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "734112B3-1383-4BE3-8721-C0F84566B764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "36B0E40A-84EF-4099-A395-75D6B8CDA196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "1DE0C8DD-9C73-4876-8193-068F18074B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4E2C6C0-FD91-40D9-B1A4-C1C348A156C7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "482C808D-C0EB-479D-B8A2-D7B04DB4854F",
                     versionEndExcluding: "15.9.57",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "40434953-906B-453E-9F4C-46BF0F693E06",
                     versionEndExcluding: "16.11.30",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7698BEE-8540-4F0C-A500-1393055B88F4",
                     versionEndExcluding: "17.2.19",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8174DBE5-A4BB-4FA6-B921-B2E82B08DAC9",
                     versionEndExcluding: "17.4.11",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8241557-9AD7-42D9-AF07-4C7C1A19AB53",
                     versionEndExcluding: "17.7.4",
                     versionStartIncluding: "17.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de Ejecución Remota de Código de Visual Studio",
      },
   ],
   id: "CVE-2023-36796",
   lastModified: "2024-11-21T08:10:36.770",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-09-12T17:15:15.173",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36796",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36796",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-191",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-02-14 21:15
Modified
2024-11-21 07:43
Summary
.NET and Visual Studio Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
microsoft .net 6.0.0
microsoft .net 7.0.0
microsoft visual_studio_2017 *
microsoft visual_studio_2019 *
microsoft visual_studio_2022 17.0
microsoft visual_studio_2022 17.2
microsoft visual_studio_2022 17.4
microsoft .net_framework 3.5
microsoft .net_framework 4.8
microsoft windows_10_1607 *
microsoft windows_10_1607 *
microsoft windows_10_1809 *
microsoft windows_10_1809 *
microsoft windows_10_20h2 *
microsoft windows_10_20h2 *
microsoft windows_10_21h2 *
microsoft windows_10_21h2 *
microsoft windows_10_21h2 *
microsoft windows_10_22h2 *
microsoft windows_10_22h2 *
microsoft windows_10_22h2 *
microsoft windows_11_21h2 *
microsoft windows_11_21h2 *
microsoft windows_server_2016 -
microsoft windows_server_2019 -
microsoft windows_server_2022 -
microsoft .net_framework 3.5
microsoft .net_framework 4.7.2
microsoft windows_10_1607 *
microsoft windows_10_1607 *
microsoft windows_10_1809 *
microsoft windows_10_1809 *
microsoft windows_10_1809 *
microsoft windows_server_2016 -
microsoft windows_server_2019 -
microsoft .net_framework 3.5
microsoft .net_framework 4.8.1
microsoft windows_10_22h2 *
microsoft .net_framework 4.8
microsoft windows_server_2008 r2
microsoft windows_server_2012 -
microsoft .net_framework 3.5
microsoft .net_framework 4.6.2
microsoft windows_10_1507 *
microsoft windows_10_1507 *
microsoft windows_10_1511 *
microsoft windows_10_1511 *
microsoft windows_10_1607 *
microsoft windows_10_1607 *
microsoft windows_10_1703 *
microsoft windows_10_1703 *
microsoft windows_10_1709 *
microsoft windows_10_1709 *
microsoft windows_10_1803 *
microsoft windows_10_1803 *
microsoft windows_10_1809 *
microsoft windows_10_1809 *
microsoft windows_10_1909 *
microsoft windows_10_1909 *
microsoft windows_10_2004 *
microsoft windows_10_2004 *
microsoft windows_10_20h2 *
microsoft windows_10_20h2 *
microsoft windows_10_21h1 *
microsoft windows_10_21h1 *
microsoft windows_10_21h2 *
microsoft windows_10_21h2 *
microsoft windows_10_22h2 *
microsoft windows_10_22h2 *
microsoft .net_framework 4.6.2
microsoft windows_server_2008 -
microsoft .net_framework 3.5
microsoft .net_framework 4.8.1
microsoft windows_10_20h2 *
microsoft windows_10_20h2 *
microsoft windows_10_20h2 *
microsoft windows_10_21h2 *
microsoft windows_10_21h2 *
microsoft windows_10_21h2 *
microsoft windows_10_22h2 *
microsoft windows_10_22h2 *
microsoft windows_11_21h2 *
microsoft windows_11_21h2 *
microsoft windows_11_22h2 *
microsoft windows_11_22h2 *
microsoft windows_server_2022 -
microsoft .net_framework 4.8
microsoft windows_server_2008 r2
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft .net_framework 4.6.2
microsoft .net_framework 4.7
microsoft .net_framework 4.7.1
microsoft .net_framework 4.7.2
microsoft windows_server_2008 r2
microsoft windows_server_2012 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:6.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6CE8612-0E01-406F-B5E7-8C7F5451E2FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4E2C6C0-FD91-40D9-B1A4-C1C348A156C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "604A3D22-3DC9-4AB2-9C23-FC41E19F5B57",
                     versionEndExcluding: "15.9.51",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "821BE24D-9EEE-42FE-B4E7-5C682F6B34C4",
                     versionEndExcluding: "16.11.24",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3393F97F-05CD-4B04-A6E1-3D914652C4E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB70FC91-06DB-4E92-9C0B-6FDE078F911B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF5EA902-2AC2-4027-802E-4C5CB8F180B1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "D00F295B-6ECF-43C4-BD71-98F835CCDB0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1648C361-E25C-42FE-8543-03DE56100201",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "4C3391B0-C6A6-4F6F-AC1B-AD0927C2C986",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "112871CE-B37B-454E-AC10-A285D92CCE0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "E461193F-C65C-47D7-89B6-F1C68877E3CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "37833862-8FE6-4007-84F1-88ACF5242F12",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "7B844383-85F5-41FA-AE73-C6C6F80734E1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "3C3151EE-B690-4412-9520-5A0EDC0E91F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "758EC2EA-ED6B-490D-A4E5-FC26AC7A0753",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "0E1ED1CF-8CE9-4C98-9691-B249B1E6A8D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5F395D0A-8E6D-4365-BB41-75208225E83F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "7BC0589A-222D-4D94-92D2-77432F8EFA61",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "E3D0CEE5-45D9-4710-B170-A33A8D0D55CF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "39F5DAC9-ED40-4870-AA86-941B0E675728",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "D00F295B-6ECF-43C4-BD71-98F835CCDB0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1648C361-E25C-42FE-8543-03DE56100201",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "251E413C-68F6-43C6-975C-C0B6AD4D36DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "4C3391B0-C6A6-4F6F-AC1B-AD0927C2C986",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "112871CE-B37B-454E-AC10-A285D92CCE0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "934D4E46-12C1-41DC-A28C-A2C430E965E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5F395D0A-8E6D-4365-BB41-75208225E83F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "79AE85FA-1B04-4A31-B8EC-EFC0C40CE7A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "E9DF76CF-2B8C-4548-98E4-7ED4DDBC5615",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1511:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "24780C21-148C-4441-AE89-4A7F08AA579A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1511:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "D6D9ED3A-90C6-4565-B2D4-6F8590B46708",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "D00F295B-6ECF-43C4-BD71-98F835CCDB0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1648C361-E25C-42FE-8543-03DE56100201",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1703:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5433DCD3-8F61-4733-8760-36A82FF0EEB2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1703:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "C3E5003B-A395-4F99-8A22-D6C493CED98C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1709:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "BAE14E15-B7AB-475B-A62A-92F70ABA09EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1709:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "B19EA4C4-6A20-4E3F-B68C-ADCE2ECA98CF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "07548CE8-7236-46B9-8D23-3FA31DABCC55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "4C25DAD2-F251-40A7-9750-31D9865269C7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "4C3391B0-C6A6-4F6F-AC1B-AD0927C2C986",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "112871CE-B37B-454E-AC10-A285D92CCE0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "99BC1BAD-6690-4FA5-8543-BF22A6DB426A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "D52DA30B-90E6-40C0-B5D2-A6DBBA3CA536",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "99546596-2062-40EF-9CA9-A89201FDFED0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "0A41C44A-61EF-493D-BF3B-810B606B5F07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "E461193F-C65C-47D7-89B6-F1C68877E3CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "37833862-8FE6-4007-84F1-88ACF5242F12",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "19A82750-CB79-4834-823B-422F7FC5044F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1989CA28-A565-4083-9CCD-F0CADAB8D352",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "3C3151EE-B690-4412-9520-5A0EDC0E91F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "758EC2EA-ED6B-490D-A4E5-FC26AC7A0753",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5F395D0A-8E6D-4365-BB41-75208225E83F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "7BC0589A-222D-4D94-92D2-77432F8EFA61",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "934D4E46-12C1-41DC-A28C-A2C430E965E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "F8C79F37-B042-4C09-80EB-2E62DBE2E241",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "E461193F-C65C-47D7-89B6-F1C68877E3CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "37833862-8FE6-4007-84F1-88ACF5242F12",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "7B844383-85F5-41FA-AE73-C6C6F80734E1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "3C3151EE-B690-4412-9520-5A0EDC0E91F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "758EC2EA-ED6B-490D-A4E5-FC26AC7A0753",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "0E1ED1CF-8CE9-4C98-9691-B249B1E6A8D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "7BC0589A-222D-4D94-92D2-77432F8EFA61",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "E3D0CEE5-45D9-4710-B170-A33A8D0D55CF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "39F5DAC9-ED40-4870-AA86-941B0E675728",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "216BE28A-ABCD-44B5-9689-770B9A62BD35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "76AB4B84-CF32-4F18-8AC7-D41EDD3792B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "734112B3-1383-4BE3-8721-C0F84566B764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "36B0E40A-84EF-4099-A395-75D6B8CDA196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
   ],
   id: "CVE-2023-21808",
   lastModified: "2024-11-21T07:43:41.657",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-02-14T21:15:11.730",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21808",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21808",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-08-08 18:15
Modified
2025-01-01 02:16
Summary
.NET and Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA257401-7276-4427-8692-7B5A6495F182",
                     versionEndExcluding: "6.0.21",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2239C44-5436-4968-959B-C686E0FAECD1",
                     versionEndExcluding: "7.0.10",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:-:*:*",
                     matchCriteriaId: "E3B42567-B3FF-4101-A639-C2883F567CF2",
                     versionEndExcluding: "17.2.18",
                     versionStartIncluding: "17.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:-:*:*",
                     matchCriteriaId: "4759CA52-CEA4-40C8-B1EF-F161DCFF0E78",
                     versionEndExcluding: "17.4.10",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:-:*:*",
                     matchCriteriaId: "0659AFA0-5AFA-42FC-8733-4502228AC26C",
                     versionEndExcluding: "17.6.6",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código de .NET y Visual Studio",
      },
   ],
   id: "CVE-2023-35390",
   lastModified: "2025-01-01T02:16:02.787",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-08T18:15:13.667",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-77",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-14 15:15
Modified
2024-11-21 07:48
Summary
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
Impacted products
Vendor Product Version
microsoft .net_framework 4.8
microsoft windows_10_1607 -
microsoft windows_10_1607 -
microsoft windows_server_2008 r2
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft windows_server_2016 -
microsoft .net_framework 4.6.2
microsoft .net_framework 4.7
microsoft .net_framework 4.7.1
microsoft .net_framework 4.7.2
microsoft windows_server_2008 r2
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft .net_framework 4.6.2
microsoft windows_server_2008 -
microsoft windows_server_2008 -
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft .net_framework 3.5
microsoft .net_framework 4.6.2
microsoft windows_10_1507 -
microsoft windows_10_1507 -
microsoft .net_framework 3.5
microsoft .net_framework 4.8.1
microsoft windows_10_1607 -
microsoft windows_10_1607 -
microsoft windows_10_21h2 -
microsoft windows_10_21h2 -
microsoft windows_10_21h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_11_21h2 -
microsoft windows_11_21h2 -
microsoft windows_11_22h2 -
microsoft windows_11_22h2 -
microsoft windows_server_2022 -
microsoft .net_framework 3.5
microsoft .net_framework 4.8
microsoft windows_10_1607 -
microsoft windows_10_1607 -
microsoft windows_10_1809 -
microsoft windows_10_1809 -
microsoft windows_10_21h2 -
microsoft windows_10_21h2 -
microsoft windows_10_21h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_11_21h2 -
microsoft windows_11_21h2 -
microsoft windows_11_22h2 -
microsoft windows_11_22h2 -
microsoft windows_server_2019 -
microsoft windows_server_2022 -
microsoft .net_framework 3.5
microsoft .net_framework 4.7.2
microsoft windows_10_1809 -
microsoft windows_10_1809 -
microsoft windows_server_2019 -
microsoft .net_framework 3.5
microsoft .net_framework 4.6.2
microsoft .net_framework 4.7
microsoft .net_framework 4.7.1
microsoft .net_framework 4.7.2
microsoft windows_10_1607 -
microsoft windows_10_1607 -
microsoft windows_server_2016 -
microsoft .net 6.0.0
microsoft .net 7.0.0
microsoft visual_studio 2015
microsoft visual_studio 2015
microsoft visual_studio_2017 *
microsoft visual_studio_2017 *
microsoft visual_studio_2019 *
microsoft visual_studio_2019 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "0A1BC97A-263E-4291-8AEF-02EE4E6031E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "734112B3-1383-4BE3-8721-C0F84566B764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "36B0E40A-84EF-4099-A395-75D6B8CDA196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
                     matchCriteriaId: "AB425562-C0A0-452E-AABE-F70522F15E1A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "A045AC0A-471E-444C-B3B0-4CABC23E8CFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "934D4E46-12C1-41DC-A28C-A2C430E965E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "0A1BC97A-263E-4291-8AEF-02EE4E6031E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "8FC46499-DB6E-48BF-9334-85EE27AFE7AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "83A79DD6-E74E-419F-93F1-323B68502633",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "61959ACC-B608-4556-92AF-4D94B338907A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "A9D54EE6-30AF-411C-A285-A4DCB6C6EC06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C230D3BF-7FCE-405C-B62E-B9190C995C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1FD62DCB-66D1-4CEA-828E-0BD302AC63CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "F2D718BD-C4B7-48DB-BE78-B9CA22F27DD0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "0C3552E0-F793-4CDD-965D-457495475805",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "B2D24C54-F04F-4717-B614-FE67B3ED9DC0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "D5EC3F68-8F41-4F6B-B2E5-920322A4A321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "0A1BC97A-263E-4291-8AEF-02EE4E6031E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "306B7CE6-8239-4AED-9ED4-4C9F5B349F58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "345FCD64-D37B-425B-B64C-8B1640B7E850",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "8FC46499-DB6E-48BF-9334-85EE27AFE7AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "83A79DD6-E74E-419F-93F1-323B68502633",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "61959ACC-B608-4556-92AF-4D94B338907A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "A9D54EE6-30AF-411C-A285-A4DCB6C6EC06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C230D3BF-7FCE-405C-B62E-B9190C995C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1FD62DCB-66D1-4CEA-828E-0BD302AC63CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "F2D718BD-C4B7-48DB-BE78-B9CA22F27DD0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "0C3552E0-F793-4CDD-965D-457495475805",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "B2D24C54-F04F-4717-B614-FE67B3ED9DC0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "D5EC3F68-8F41-4F6B-B2E5-920322A4A321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "306B7CE6-8239-4AED-9ED4-4C9F5B349F58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "345FCD64-D37B-425B-B64C-8B1640B7E850",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "734112B3-1383-4BE3-8721-C0F84566B764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "36B0E40A-84EF-4099-A395-75D6B8CDA196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "0A1BC97A-263E-4291-8AEF-02EE4E6031E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "1DE0C8DD-9C73-4876-8193-068F18074B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4E2C6C0-FD91-40D9-B1A4-C1C348A156C7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio:2015:update3:*:*:*:*:*:*",
                     matchCriteriaId: "62FE95C2-066B-491D-82BF-3EF173822B2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio:2015:update5:*:*:*:*:*:*",
                     matchCriteriaId: "647EBBAA-C731-4954-A62C-2B1AAFB1061C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "754856ED-0708-4505-B3CC-C3CF1818DD59",
                     versionEndIncluding: "15.8",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "979A6A3D-64F8-4099-A00D-16F5BAC2BD79",
                     versionEndExcluding: "15.9.55",
                     versionStartIncluding: "15.9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "26472C42-CDB4-4176-B10B-3BF26F5030E3",
                     versionEndIncluding: "16.10",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFF8A760-E6E1-483D-A955-102A8D82B62C",
                     versionEndExcluding: "16.11.27",
                     versionStartIncluding: "16.11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1F98BC-0D82-4AEB-9E1E-D67325E99385",
                     versionEndExcluding: "17.0.22",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6B0B496-BC41-4F9D-9A28-AE7664B5C77D",
                     versionEndExcluding: "17.2.16",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC861E65-1682-4E99-8A7B-F4A31DDC0198",
                     versionEndExcluding: "17.4.8",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51DB90D6-C1C4-43B9-8B37-696CB361F37F",
                     versionEndExcluding: "17.6.3",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
      },
   ],
   id: "CVE-2023-24897",
   lastModified: "2024-11-21T07:48:43.800",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-06-14T15:15:09.503",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24897",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24897",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-122",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2025-01-14 18:15
Modified
2025-02-05 20:03
Summary
.NET and Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:8.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECB25C50-5246-435F-B5C6-C4643ADBEC47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:9.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DFE5320-88E8-42C2-BC1C-E402FE71ECBB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "754856ED-0708-4505-B3CC-C3CF1818DD59",
                     versionEndIncluding: "15.8",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "26472C42-CDB4-4176-B10B-3BF26F5030E3",
                     versionEndIncluding: "16.10",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C373831-8981-462F-8A57-9C71D1839052",
                     versionEndExcluding: "17.6.22",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CA6DD18-569B-449D-82FF-4BE3A57E7150",
                     versionEndExcluding: "17.8.17",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDA7CDF2-DB37-4C34-9D5F-E09B34B83B1A",
                     versionEndExcluding: "17.10.10",
                     versionStartIncluding: "17.10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CDB41EA-38E1-4325-8DE7-27E187C1695B",
                     versionEndExcluding: "17.12.4",
                     versionStartIncluding: "17.12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código en .NET y Visual Studio",
      },
   ],
   id: "CVE-2025-21172",
   lastModified: "2025-02-05T20:03:33.053",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.6,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2025-01-14T18:15:30.300",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21172",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-122",
            },
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "secure@microsoft.com",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-04-09 17:15
Modified
2025-01-14 20:49
Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "453652D6-37A7-49BC-8660-330EADA8CCDD",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "422283AD-E25A-4779-BB9A-0E496BFAC524",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "9BDD3D5D-70D5-4767-95DC-25873774B536",
                     versionEndExcluding: "17.10.6.1",
                     versionStartIncluding: "17.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "C8B405E1-CC25-4883-A26D-4A4237E43FB0",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
                     matchCriteriaId: "7236DD21-703E-4359-88AD-E68C3B1D33FE",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "948FC47B-E7FE-404A-A747-18DA61D35A3F",
                     versionEndExcluding: "18.3.3.1",
                     versionStartIncluding: "18.0.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "DD9CBEE2-6BF0-45E5-8DAA-2749344ECCFE",
                     versionEndExcluding: "15.0.2110.4",
                     versionStartIncluding: "15.0.2000.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C9C35D21-EE02-4562-8196-7A4781DECF06",
                     versionEndExcluding: "15.0.4360.2",
                     versionStartIncluding: "15.0.4003.23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "6A943249-37AA-4E3B-A074-7E87EC4CD040",
                     versionEndExcluding: "16.0.1115.1",
                     versionStartIncluding: "16.0.1000.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "2ADF9550-5FAA-4696-9F59-8D235B989541",
                     versionEndExcluding: "16.0.4120.1",
                     versionStartIncluding: "16.0.4003.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B69AEE86-A505-42EA-ADD3-FB0F6346C2FA",
                     versionEndExcluding: "16.11.35",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8133E65A-AE80-4266-A445-265908DD8E21",
                     versionEndExcluding: "17.4.18",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "35FAD418-A4C1-40C3-8F08-A08CA1190BB0",
                     versionEndExcluding: "17.6.14",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "39E176F7-8E26-4175-98FE-99288ADD2DA3",
                     versionEndExcluding: "17.8.9",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2188B97-2B2C-445A-B667-2C3269B94959",
                     versionEndExcluding: "17.9.6",
                     versionStartIncluding: "17.9.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código del controlador ODBC de Microsoft para SQL Server",
      },
   ],
   id: "CVE-2024-28935",
   lastModified: "2025-01-14T20:49:46.410",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-04-09T17:15:54.980",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28935",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28935",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-122",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-07-09 17:15
Modified
2024-11-21 09:20
Summary
.NET and Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "223CB8C9-39B9-44E2-83AA-79F7C2B45D67",
                     versionEndExcluding: "8.0.7",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9079F629-6958-469E-AF83-8030B145E354",
                     versionEndExcluding: "17.4.21",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1C74913-B238-4B3C-8F2D-37FFCCAB5E9E",
                     versionEndExcluding: "17.6.17",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "547E0354-EE7E-43BA-B3C7-E4A59C414312",
                     versionEndExcluding: "17.8.12",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA8A2DA8-D24E-4AB5-8685-A42EB33E1D6D",
                     versionEndExcluding: "17.10.4",
                     versionStartIncluding: "17.10.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código de .NET y Visual Studio",
      },
   ],
   id: "CVE-2024-35264",
   lastModified: "2024-11-21T09:20:02.723",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-07-09T17:15:18.213",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35264",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35264",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-05-14 17:17
Modified
2025-01-08 18:36
Summary
.NET and Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "98AEF40E-333C-4B7C-A1A7-522459C01F90",
                     versionEndExcluding: "7.0.19",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A6ED34-B810-42BF-9256-8632F965EBED",
                     versionEndExcluding: "8.0.5",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D708FAC-81E3-4E60-B9D9-7C7AA614A503",
                     versionEndExcluding: "7.4.3",
                     versionStartIncluding: "7.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8851D8F-C0FC-4957-846E-BEF69B88B9D6",
                     versionEndExcluding: "17.4.19",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "24B799F3-962A-4366-9B5C-2F60E2098B7D",
                     versionEndExcluding: "17.6.15",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "55C50579-44BA-4C6A-9CD5-A71D3D80F4E5",
                     versionEndExcluding: "17.8.10",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA2D642F-B4D4-4B84-ACCA-653201079267",
                     versionEndExcluding: "17.9.7",
                     versionStartIncluding: "17.9.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código de .NET y Visual Studio",
      },
   ],
   id: "CVE-2024-30045",
   lastModified: "2025-01-08T18:36:30.457",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 6.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.4,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-05-14T17:17:17.023",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20241122-0001/",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-122",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-02-14 21:15
Modified
2024-11-21 07:46
Summary
Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "832BAB52-5118-4E00-955D-BF3716B288D0",
                     versionEndExcluding: "15.9.52",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "821BE24D-9EEE-42FE-B4E7-5C682F6B34C4",
                     versionEndExcluding: "16.11.24",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AA616AA-25E5-4943-A614-99FF6DFF260E",
                     versionEndExcluding: "17.0.19",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "191993E5-B343-45A6-B485-F45F5D8E924D",
                     versionEndExcluding: "17.2.13",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F16E4665-E579-4211-92C0-D8058F73A359",
                     versionEndExcluding: "17.4.5",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código de Visual Studio",
      },
   ],
   id: "CVE-2023-23381",
   lastModified: "2024-11-21T07:46:04.430",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Secondary",
         },
      ],
   },
   published: "2023-02-14T21:15:12.920",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23381",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23381",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-122",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-06-15 22:15
Modified
2025-02-28 20:15
Summary
.NET and Visual Studio Information Disclosure Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8095DD06-0E31-477D-97C8-8358D66E46A0",
                     versionEndExcluding: "17.0.4",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "1DE0C8DD-9C73-4876-8193-068F18074B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_core:3.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "70BE107E-20A0-4998-A8ED-BCC414C6BDBF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:nuget:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AD07BA6-1A4A-4F3E-AA52-08D822416159",
                     versionEndExcluding: "6.2.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9025CDD-C3BB-48FC-9E9D-486A6246B833",
                     versionEndExcluding: "16.9.22",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08BF21BA-1D93-4402-9A4E-691000789125",
                     versionEndExcluding: "16.11.6",
                     versionStartIncluding: "16.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:8.10:*:*:*:*:macos:*:*",
                     matchCriteriaId: "BA547FFE-D557-4612-9840-EEE88ACF53AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "474482B7-6211-4988-B77E-C1C8378B09C9",
                     versionEndExcluding: "17.0.11",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1E4B8BB-0B51-4F8E-8C94-72403EE73E24",
                     versionEndExcluding: "17.2.5",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Information Disclosure Vulnerability",
      },
      {
         lang: "es",
         value: "Una Vulnerabilidad de Divulgación de Información en .NET y Visual Studio",
      },
   ],
   id: "CVE-2022-30184",
   lastModified: "2025-02-28T20:15:39.620",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
      ],
   },
   published: "2022-06-15T22:15:15.370",
   references: [
      {
         source: "secure@microsoft.com",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30184",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMP34G53EA2DBTBLFOAQCDZRRENE2EA2/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWNH4AC3LFVX35MDRX5OBZDGD2AMH66K/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30184",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-09-12 17:15
Modified
2024-11-21 08:10
Summary
Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EDC4407-7E92-4E60-82F0-0C87D1860D3A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "42A6DF09-B8E1-414D-97E7-453566055279",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "D400E856-2B2E-4CEA-8CA5-309FDF371CEA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "5F422A8C-2C4E-42C8-B420-E0728037E15C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E332666-2E03-468E-BC30-299816D6E8ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F513002-D8C1-4D3A-9F79-4B52498F67E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB4AE761-6FAC-4000-A63D-42CE3FAB8412",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "934D4E46-12C1-41DC-A28C-A2C430E965E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F513002-D8C1-4D3A-9F79-4B52498F67E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB4AE761-6FAC-4000-A63D-42CE3FAB8412",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4793BFB-2E4E-4067-87A5-4B8749025CA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3F18AF-84ED-473B-A8DF-65EB23C475AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "61019899-D7AF-46E4-A72C-D189180F66AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E332666-2E03-468E-BC30-299816D6E8ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "734112B3-1383-4BE3-8721-C0F84566B764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "36B0E40A-84EF-4099-A395-75D6B8CDA196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "1DE0C8DD-9C73-4876-8193-068F18074B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4E2C6C0-FD91-40D9-B1A4-C1C348A156C7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "482C808D-C0EB-479D-B8A2-D7B04DB4854F",
                     versionEndExcluding: "15.9.57",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "40434953-906B-453E-9F4C-46BF0F693E06",
                     versionEndExcluding: "16.11.30",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7698BEE-8540-4F0C-A500-1393055B88F4",
                     versionEndExcluding: "17.2.19",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8174DBE5-A4BB-4FA6-B921-B2E82B08DAC9",
                     versionEndExcluding: "17.4.11",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8241557-9AD7-42D9-AF07-4C7C1A19AB53",
                     versionEndExcluding: "17.7.4",
                     versionStartIncluding: "17.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de Ejecución Remota de Código de Visual Studio",
      },
   ],
   id: "CVE-2023-36794",
   lastModified: "2024-11-21T08:10:36.577",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-09-12T17:15:14.947",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36794",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36794",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-191",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-08-13 18:15
Modified
2024-08-16 19:07
Summary
.NET and Visual Studio Information Disclosure Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDD9C1E0-276A-4A51-8950-6F67C00A2FDE",
                     versionEndExcluding: "8.0.8",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B44E6F98-ADC6-4CC9-9DC7-7241AA68A8BC",
                     versionEndExcluding: "17.6.18",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0190B0D7-8EB7-47E7-9889-501A420FD0A4",
                     versionEndExcluding: "17.8.13",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "21986A2A-8166-486E-964D-C4A0CECE9AE2",
                     versionEndExcluding: "17.10.6",
                     versionStartIncluding: "17.10.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Information Disclosure Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de divulgación de información de .NET y Visual Studio",
      },
   ],
   id: "CVE-2024-38167",
   lastModified: "2024-08-16T19:07:00.757",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-08-13T18:15:24.370",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38167",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-319",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-03-12 17:15
Modified
2024-11-29 20:52
Summary
.NET and Visual Studio Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "703B87E9-C6D6-4C68-B8FE-339ECB852751",
                     versionEndExcluding: "7.0.17",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B63FDDA-5C8D-4B45-B92C-6D8A12B40493",
                     versionEndExcluding: "8.0.3",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC909F7F-388D-4407-951A-3D22C6061EBC",
                     versionEndExcluding: "7.3.12",
                     versionStartIncluding: "7.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:7.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "FFAAFDC7-5AA2-43E6-BE0B-7E0C02FC39C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5439C09-DAAE-443D-8789-CFF1D256F043",
                     versionEndExcluding: "17.4.17",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "773E7E41-31D8-4F6A-AE0B-3B2C217D6A19",
                     versionEndExcluding: "17.6.13",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "44E68F4D-72A4-466D-BF96-CB21C0FC8716",
                     versionEndExcluding: "17.8.8",
                     versionStartIncluding: "17.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F44D9E3A-06AA-453D-AB1A-B25BD7591912",
                     versionEndExcluding: "17.9.3",
                     versionStartIncluding: "17.9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de denegación de servicio en .NET y Visual Studio",
      },
   ],
   id: "CVE-2024-21392",
   lastModified: "2024-11-29T20:52:32.870",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-03-12T17:15:49.637",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21392",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21392",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-01-09 18:15
Modified
2024-11-21 08:45
Summary
Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability
Impacted products
Vendor Product Version
microsoft microsoft.data.sqlclient *
microsoft microsoft.data.sqlclient *
microsoft microsoft.data.sqlclient *
microsoft microsoft.data.sqlclient *
microsoft sql_server 2022
microsoft sql_server 2022
microsoft system.data.sqlclient *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft .net_framework *
microsoft windows_10_1607 -
microsoft windows_10_1607 -
microsoft windows_server_2008 r2
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft windows_server_2016 -
microsoft .net_framework *
microsoft windows_server_2008 r2
microsoft .net_framework 4.6.2
microsoft .net_framework 4.7
microsoft .net_framework 4.7.1
microsoft .net_framework 4.7.2
microsoft windows_server_2008 r2
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft .net_framework 3.5
microsoft .net_framework 4.8.1
microsoft windows_10_1809 -
microsoft windows_10_1809 -
microsoft windows_10_21h2 -
microsoft windows_10_21h2 -
microsoft windows_10_21h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_11_21h2 -
microsoft windows_11_21h2 -
microsoft windows_11_22h2 -
microsoft windows_11_22h2 -
microsoft windows_11_23h2 -
microsoft windows_11_23h2 -
microsoft windows_server_2019 -
microsoft windows_server_2022 -
microsoft windows_server_2022_23h2 -
microsoft .net_framework *
microsoft .net_framework 3.5
microsoft windows_10_1809 -
microsoft windows_10_1809 -
microsoft windows_10_21h2 -
microsoft windows_10_21h2 -
microsoft windows_10_21h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_10_22h2 -
microsoft windows_11_21h2 -
microsoft windows_11_21h2 -
microsoft windows_11_22h2 -
microsoft windows_11_22h2 -
microsoft windows_server_2019 -
microsoft windows_server_2022 -
microsoft windows_server_2022_23h2 -
microsoft .net_framework 3.5
microsoft .net_framework 4.7.2
microsoft windows_10_1607 -
microsoft windows_10_1607 -
microsoft windows_10_1809 -
microsoft windows_10_1809 -
microsoft windows_10_1809 -
microsoft windows_server_2016 -
microsoft windows_server_2019 -
microsoft .net_framework 2.0
microsoft windows_server_2008 -
microsoft .net *
microsoft .net *
microsoft .net 8.0.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:microsoft.data.sqlclient:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "96196E29-EA18-45C5-AE3B-C457B4EBC5B4",
                     versionEndExcluding: "2.1.7",
                     versionStartIncluding: "2.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:microsoft.data.sqlclient:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBB755B8-5F3F-424F-9D6D-E13170BF5BB6",
                     versionEndExcluding: "3.1.5",
                     versionStartIncluding: "3.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:microsoft.data.sqlclient:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7D0335C-84B7-411C-9D1D-5E9DF5097403",
                     versionEndExcluding: "4.0.5",
                     versionStartIncluding: "4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:microsoft.data.sqlclient:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE3BE1DD-CF5E-46FB-BC6C-CE5FB9C5563F",
                     versionEndExcluding: "5.1.3",
                     versionStartIncluding: "5.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server:2022:*:*:*:*:*:x64:*",
                     matchCriteriaId: "6CB7AD22-F27B-4807-88F1-02ED420421D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:sql_server:2022:cumulative_update_10:*:*:*:*:*:*",
                     matchCriteriaId: "84A3BAC2-8BB5-46D1-9B6D-5D3FEF082738",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:system.data.sqlclient:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E89B2EC1-FF2E-49F5-8CB2-E6E69C6171FE",
                     versionEndExcluding: "4.8.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "05D999A1-AB25-4642-8D94-07AD00FEE820",
                     versionEndExcluding: "17.2.23",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE1C61FB-CC6B-4D88-8B7F-FFE9D1238A6C",
                     versionEndExcluding: "17.4.15",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9C0A3-7D62-40CE-8493-514CB313F72C",
                     versionEndExcluding: "17.6.11",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD49CC9F-3750-4EB3-A934-E45F0DE41238",
                     versionEndExcluding: "17.8.4",
                     versionStartIncluding: "17.8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "071AF08C-F921-45EC-A6AC-3BCE75D7FB22",
                     versionEndExcluding: "4.8.04690.02",
                     versionStartIncluding: "4.8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "0A1BC97A-263E-4291-8AEF-02EE4E6031E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F2BA42-96F4-4DD6-ADFC-B5B8D45BCB78",
                     versionEndExcluding: "4.8.04690.01",
                     versionStartIncluding: "4.8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "734112B3-1383-4BE3-8721-C0F84566B764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "36B0E40A-84EF-4099-A395-75D6B8CDA196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "934D4E46-12C1-41DC-A28C-A2C430E965E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "306B7CE6-8239-4AED-9ED4-4C9F5B349F58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "345FCD64-D37B-425B-B64C-8B1640B7E850",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "8FC46499-DB6E-48BF-9334-85EE27AFE7AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "83A79DD6-E74E-419F-93F1-323B68502633",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "61959ACC-B608-4556-92AF-4D94B338907A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "A9D54EE6-30AF-411C-A285-A4DCB6C6EC06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C230D3BF-7FCE-405C-B62E-B9190C995C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1FD62DCB-66D1-4CEA-828E-0BD302AC63CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "F2D718BD-C4B7-48DB-BE78-B9CA22F27DD0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "0C3552E0-F793-4CDD-965D-457495475805",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "B2D24C54-F04F-4717-B614-FE67B3ED9DC0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "D5EC3F68-8F41-4F6B-B2E5-920322A4A321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "B0301BA0-81DB-4FC1-9BC3-EB48A56BC608",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "8E3C1327-F331-4448-A253-00EAC7428317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75CCACE6-A0EE-4A6F-BD5A-7AA504B02717",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "071AF08C-F921-45EC-A6AC-3BCE75D7FB22",
                     versionEndExcluding: "4.8.04690.02",
                     versionStartIncluding: "4.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "306B7CE6-8239-4AED-9ED4-4C9F5B349F58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "345FCD64-D37B-425B-B64C-8B1640B7E850",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "8FC46499-DB6E-48BF-9334-85EE27AFE7AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "83A79DD6-E74E-419F-93F1-323B68502633",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "61959ACC-B608-4556-92AF-4D94B338907A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "A9D54EE6-30AF-411C-A285-A4DCB6C6EC06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C230D3BF-7FCE-405C-B62E-B9190C995C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1FD62DCB-66D1-4CEA-828E-0BD302AC63CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "F2D718BD-C4B7-48DB-BE78-B9CA22F27DD0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "0C3552E0-F793-4CDD-965D-457495475805",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "B2D24C54-F04F-4717-B614-FE67B3ED9DC0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "D5EC3F68-8F41-4F6B-B2E5-920322A4A321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75CCACE6-A0EE-4A6F-BD5A-7AA504B02717",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E039CE1F-B988-4741-AE2E-5B36E2AF9688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "0A1BC97A-263E-4291-8AEF-02EE4E6031E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "73D24713-D897-408D-893B-77A61982597D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "306B7CE6-8239-4AED-9ED4-4C9F5B349F58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "345FCD64-D37B-425B-B64C-8B1640B7E850",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "42A6DF09-B8E1-414D-97E7-453566055279",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "498DF6C9-EC7C-4A4F-A188-B22E82FD6540",
                     versionEndExcluding: "6.0.26",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE00AC7-D405-4567-8CB1-C3ED7E2925C6",
                     versionEndExcluding: "7.0.15",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:8.0.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "2BD92442-4815-4085-B66F-9A610097A41B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de omisión de característica de seguridad del proveedor de datos SQL de Microsoft.Data.SqlClient y System.Data.SqlClient",
      },
   ],
   id: "CVE-2024-0056",
   lastModified: "2024-11-21T08:45:49.180",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 8.7,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 5.8,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-01-09T18:15:46.783",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0056",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0056",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-319",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-07-11 18:15
Modified
2024-11-21 08:04
Summary
.NET and Visual Studio Elevation of Privilege Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5730CE86-D1BB-403D-BE28-09BAC686B645",
                     versionEndExcluding: "6.0.20",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EBEC922-21D4-458E-B9A9-A29CAD09C2D3",
                     versionEndExcluding: "7.0.9",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "46E1B01E-2B9A-4666-A680-DED9669FD62B",
                     versionEndExcluding: "17.0.23",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "63B52F8F-CF6B-40C5-B4D9-342FA4C3D21C",
                     versionEndExcluding: "17.2.17",
                     versionStartIncluding: "17.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "45D57A7D-14A4-4916-B029-12E8D3C8EDAD",
                     versionEndExcluding: "17.4.9",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8771AEC-CE62-4C47-922A-A6205FDF3ECE",
                     versionEndExcluding: "17.6.5",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C0E9FAF-2CDC-42E4-B2BB-44E6136E3D22",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Elevation of Privilege Vulnerability",
      },
   ],
   id: "CVE-2023-33127",
   lastModified: "2024-11-21T08:04:56.660",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-07-11T18:15:14.213",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33127",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33127",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-1220",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-03-12 17:15
Modified
2024-12-27 17:14
Summary
Microsoft QUIC Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "703B87E9-C6D6-4C68-B8FE-339ECB852751",
                     versionEndExcluding: "7.0.17",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B63FDDA-5C8D-4B45-B92C-6D8A12B40493",
                     versionEndExcluding: "8.0.3",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC909F7F-388D-4407-951A-3D22C6061EBC",
                     versionEndExcluding: "7.3.12",
                     versionStartIncluding: "7.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4C52BDA-482C-473D-AA57-9EECA060B374",
                     versionEndExcluding: "7.4.2",
                     versionStartIncluding: "7.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD7CF33B-E4FA-4DF9-8EFE-855D97DA19CC",
                     versionEndExcluding: "17.4.17",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFAFF9E3-6566-480B-AFC1-1D1EDF18CD1B",
                     versionEndExcluding: "17.6.13",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "02BBD881-8D8E-429C-B702-7AEBB4B7089A",
                     versionEndExcluding: "17.8.8",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D8C0610-A708-41C4-8E4C-06DD965A3487",
                     versionEndExcluding: "17.9.3",
                     versionStartIncluding: "17.9.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D08CEC8B-343C-486E-B6FA-F4D60ACF7E63",
                     versionEndExcluding: "10.0.22000.2836",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DBD4A55-729C-4F86-AE29-6067F62FD03A",
                     versionEndExcluding: "10.0.22621.3296",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A332CC68-568F-406B-8463-9FEF359BEA4C",
                     versionEndExcluding: "10.0.22631.3296",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EDA5547-D293-41D0-A10C-4A613E725231",
                     versionEndExcluding: "10.0.20348.2340",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AD05A2D-BA23-4B63-8B75-1395F74C36CB",
                     versionEndExcluding: "10.0.25398.763",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft QUIC Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de denegación de servicio de Microsoft QUIC",
      },
   ],
   id: "CVE-2024-26190",
   lastModified: "2024-12-27T17:14:18.263",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-03-12T17:15:57.883",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26190",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26190",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-09-12 17:15
Modified
2024-11-21 08:10
Summary
Visual Studio Elevation of Privilege Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "40434953-906B-453E-9F4C-46BF0F693E06",
                     versionEndExcluding: "16.11.30",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "37E17676-8AD6-4FB1-8983-EB1CD4B888EF",
                     versionEndExcluding: "17.2.19",
                     versionStartIncluding: "17.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B49C4225-E3D7-4FEF-AAB5-5866C897B6F1",
                     versionEndExcluding: "17.4.11",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8C5B89F-287F-43BA-99B3-85B475B53CE2",
                     versionEndExcluding: "17.6.7",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F041DA8F-B61D-4AF5-9248-22D68F38E74F",
                     versionEndExcluding: "17.7.4",
                     versionStartIncluding: "17.7.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Elevation of Privilege Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de Elevación de Privilegios en Visual Studio",
      },
   ],
   id: "CVE-2023-36759",
   lastModified: "2024-11-21T08:10:32.297",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-09-12T17:15:11.513",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-822",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-14 18:15
Modified
2024-11-21 08:09
Summary
Visual Studio Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "752ECA79-5204-4BDB-9ED5-15CA092EDC76",
                     versionEndExcluding: "16.11.32",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EABB880-0CBA-45CD-A197-CB1EE1710061",
                     versionEndExcluding: "17.2.22",
                     versionStartIncluding: "17.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCC513DB-075E-4D09-B289-902F3C16BFB7",
                     versionEndExcluding: "17.4.14",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "56738F2F-8802-4ADB-AC7C-9BAD67626C75",
                     versionEndExcluding: "17.6.10",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD1B0CE9-6A87-47DC-A27B-9587A6B5B45D",
                     versionEndExcluding: "17.7.7",
                     versionStartIncluding: "17.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de denegación de servicio de Visual Studio.",
      },
   ],
   id: "CVE-2023-36042",
   lastModified: "2024-11-21T08:09:13.847",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.2,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.5,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-14T18:15:34.563",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36042",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36042",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-122",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-07-09 17:15
Modified
2024-11-21 09:24
Summary
.NET and Visual Studio Denial of Service Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "223CB8C9-39B9-44E2-83AA-79F7C2B45D67",
                     versionEndExcluding: "8.0.7",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9079F629-6958-469E-AF83-8030B145E354",
                     versionEndExcluding: "17.4.21",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1C74913-B238-4B3C-8F2D-37FFCCAB5E9E",
                     versionEndExcluding: "17.6.17",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "547E0354-EE7E-43BA-B3C7-E4A59C414312",
                     versionEndExcluding: "17.8.12",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA8A2DA8-D24E-4AB5-8685-A42EB33E1D6D",
                     versionEndExcluding: "17.10.4",
                     versionStartIncluding: "17.10.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: ".NET and Visual Studio Denial of Service Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de denegación de servicio en .NET y Visual Studio",
      },
   ],
   id: "CVE-2024-38095",
   lastModified: "2024-11-21T09:24:53.863",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-07-09T17:15:46.313",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38095",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38095",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2025-01-14 18:15
Modified
2025-01-27 18:42
Summary
Visual Studio Remote Code Execution Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B35392C-DFB3-4AEE-AB3C-09CE3D2B7A7D",
                     versionEndExcluding: "15.9.69",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:-:*:*",
                     matchCriteriaId: "17DF3758-1A21-494C-B450-FC70FB246428",
                     versionEndExcluding: "16.11.43",
                     versionStartIncluding: "16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C373831-8981-462F-8A57-9C71D1839052",
                     versionEndExcluding: "17.6.22",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CA6DD18-569B-449D-82FF-4BE3A57E7150",
                     versionEndExcluding: "17.8.17",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDA7CDF2-DB37-4C34-9D5F-E09B34B83B1A",
                     versionEndExcluding: "17.10.10",
                     versionStartIncluding: "17.10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CDB41EA-38E1-4325-8DE7-27E187C1695B",
                     versionEndExcluding: "17.12.4",
                     versionStartIncluding: "17.12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Remote Code Execution Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de ejecución remota de código en Visual Studio",
      },
   ],
   id: "CVE-2025-21178",
   lastModified: "2025-01-27T18:42:39.560",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2025-01-14T18:15:30.847",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21178",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-122",
            },
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "secure@microsoft.com",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-04-15 19:15
Modified
2024-11-21 06:50
Summary
Visual Studio Elevation of Privilege Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F612C95-DADC-4133-8AFF-1B9CFEB8D0C0",
                     versionEndIncluding: "16.9",
                     versionStartIncluding: "15.9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2019:8.10:*:*:*:*:macos:*:*",
                     matchCriteriaId: "BA547FFE-D557-4612-9840-EEE88ACF53AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3393F97F-05CD-4B04-A6E1-3D914652C4E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:17.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "950638D8-6997-4058-8A9E-6153A7FC3B32",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Visual Studio Elevation of Privilege Vulnerability",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Elevación de Privilegios en Visual Studio",
      },
   ],
   id: "CVE-2022-24513",
   lastModified: "2024-11-21T06:50:34.817",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
      ],
   },
   published: "2022-04-15T19:15:11.057",
   references: [
      {
         source: "secure@microsoft.com",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24513",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24513",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-01-09 19:15
Modified
2024-11-21 08:54
Summary
Microsoft Identity Denial of service vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "498DF6C9-EC7C-4A4F-A188-B22E82FD6540",
                     versionEndExcluding: "6.0.26",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE00AC7-D405-4567-8CB1-C3ED7E2925C6",
                     versionEndExcluding: "7.0.15",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8583992E-20C5-4437-ACFE-22FEBD539E4C",
                     versionEndExcluding: "8.0.1",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:identity_model:*:*:*:*:*:.net:*:*",
                     matchCriteriaId: "F39C475D-FDCE-4DE1-B936-01D268FD7645",
                     versionEndExcluding: "5.7.0",
                     versionStartIncluding: "5.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:identity_model:*:*:*:*:*:.net:*:*",
                     matchCriteriaId: "A286ABF0-E7B7-44E0-9EF1-0226BDD5338A",
                     versionEndExcluding: "6.34.0",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:identity_model:*:*:*:*:*:.net:*:*",
                     matchCriteriaId: "B12074D2-B6C2-4797-BCE8-27A5E6314FB1",
                     versionEndExcluding: "7.1.2",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "42B33777-27CB-45CC-A95A-3F4369DBB31D",
                     versionEndExcluding: "17.2.23",
                     versionStartIncluding: "17.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E578915C-4563-4767-A1F9-7C0ADF58BDA6",
                     versionEndExcluding: "17.4.15",
                     versionStartIncluding: "17.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB1E1DB4-BE9A-48E9-808D-E239CFDB26BA",
                     versionEndExcluding: "17.6.11",
                     versionStartIncluding: "17.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6D3ECE-ED4D-4778-900F-4D4E1D05F00E",
                     versionEndExcluding: "17.8.4",
                     versionStartIncluding: "17.8.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft Identity Denial of service vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de denegación de servicio de identidad de Microsoft",
      },
   ],
   id: "CVE-2024-21319",
   lastModified: "2024-11-21T08:54:06.097",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.8,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.3,
            impactScore: 4,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-01-09T19:15:12.070",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21319",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21319",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}