Beschreibung
Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to spoof user interface, cause denial of service, execute arbitrary code, obtain sensitive information, gain privileges.
Below is a complete list of vulnerabilities:
- A spoofing vulnerability in Visual Studio Tools for Office Runtime can be exploited remotely to spoof user interface.
- A denial of service vulnerability in .NET and Visual Studio can be exploited remotely to cause denial of service.
- A spoofing vulnerability in .NET Framework can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in .NET and Visual Studio can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Azure DevOps Server can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in ASP.NET Core SignalR and Visual Studio can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in ASP.NET can be exploited remotely to gain privileges.
- A denial of service vulnerability in .NET Core and Visual Studio can be exploited remotely to cause denial of service.
Ursprüngliche Informationshinweise
- CVE-2023-38180
- CVE-2023-36873
- CVE-2023-35390
- CVE-2023-36869
- CVE-2023-35391
- CVE-2023-36899
- CVE-2023-38178
Ausnutzung
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Betroffene Produkte
CVE Liste
- CVE-2023-36897 high
- CVE-2023-36869 high
- CVE-2023-38180 critical
- CVE-2023-36873 high
- CVE-2023-35390 critical
- CVE-2023-35391 critical
- CVE-2023-36899 critical
- CVE-2023-38178 critical
KB Liste
- 5029242
- 5029259
- 5028948
- 5029569
- 5029655
- 5028952
- 5029648
- 5029566
- 5029649
- 5029654
- 5029653
- 5029567
- 5029568
- 5029647
- 5029689
- 5029688
- 5029652
- 5029650
- 5029651
- 5029497
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!