Descripción
Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to spoof user interface, cause denial of service, execute arbitrary code, obtain sensitive information, gain privileges.
Below is a complete list of vulnerabilities:
- A spoofing vulnerability in Visual Studio Tools for Office Runtime can be exploited remotely to spoof user interface.
- A denial of service vulnerability in .NET and Visual Studio can be exploited remotely to cause denial of service.
- A spoofing vulnerability in .NET Framework can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in .NET and Visual Studio can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Azure DevOps Server can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in ASP.NET Core SignalR and Visual Studio can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in ASP.NET can be exploited remotely to gain privileges.
- A denial of service vulnerability in .NET Core and Visual Studio can be exploited remotely to cause denial of service.
Notas informativas originales
- CVE-2023-38180
- CVE-2023-36873
- CVE-2023-35390
- CVE-2023-36869
- CVE-2023-35391
- CVE-2023-36899
- CVE-2023-38178
Explotación
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Productos relacionados
Lista CVE
- CVE-2023-36897 high
- CVE-2023-36869 high
- CVE-2023-38180 critical
- CVE-2023-36873 high
- CVE-2023-35390 critical
- CVE-2023-35391 critical
- CVE-2023-36899 critical
- CVE-2023-38178 critical
Lista KB
- 5029242
- 5029259
- 5028948
- 5029569
- 5029655
- 5028952
- 5029648
- 5029566
- 5029649
- 5029654
- 5029653
- 5029567
- 5029568
- 5029647
- 5029689
- 5029688
- 5029652
- 5029650
- 5029651
- 5029497
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!