ASP.NET Elevation of Privilege Vulnerability
References
Link | Resource |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36899 | Patch Vendor Advisory |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36899 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
21 Nov 2024, 08:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36899 - Patch, Vendor Advisory |
29 May 2024, 02:16
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-20 |
15 Oct 2023, 16:18
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:* |
11 Aug 2023, 17:56
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CPE | cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:* cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:* cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net:2.0:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:* cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* |
|
First Time |
Microsoft windows Server 2022
Microsoft windows Server 2019 Microsoft windows Server 2012 Microsoft Microsoft .net Microsoft windows 10 22h2 Microsoft windows 10 1809 Microsoft windows 11 21h2 Microsoft windows 10 21h2 Microsoft windows Server 2008 Microsoft windows Server 2016 Microsoft .net Framework |
|
CWE | NVD-CWE-noinfo | |
References | (MISC) https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36899 - Patch, Vendor Advisory |
08 Aug 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-08 19:15
Updated : 2024-11-21 08:10
NVD link : CVE-2023-36899
Mitre link : CVE-2023-36899
CVE.ORG link : CVE-2023-36899
JSON object : View
Products Affected
microsoft
- windows_server_2008
- .net_framework
- windows_10_22h2
- windows_server_2022
- windows_server_2016
- windows_10_21h2
- windows_server_2019
- windows_11_21h2
- windows_10_1809
- windows_server_2012
CWE