ASP.NET Elevation of Privilege Vulnerability
References
| Link | Resource |
|---|---|
| https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36899 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
History
15 Oct 2023, 16:18
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:* |
11 Aug 2023, 17:56
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| References | (MISC) https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36899 - Patch, Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| First Time |
Microsoft .net Framework
Microsoft windows Server 2008 Microsoft windows 10 1809 Microsoft windows Server 2012 Microsoft Microsoft windows Server 2016 Microsoft windows Server 2019 Microsoft .net Microsoft windows 11 21h2 Microsoft windows 10 21h2 Microsoft windows 10 22h2 Microsoft windows Server 2022 |
|
| CPE | cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:* cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:* cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:* cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net:2.0:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:* cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:* |
08 Aug 2023, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-08-08 19:15
Updated : 2024-05-29 02:16
NVD link : CVE-2023-36899
Mitre link : CVE-2023-36899
JSON object : View
Products Affected
microsoft
- windows_11_21h2
- windows_10_21h2
- windows_server_2019
- windows_server_2012
- windows_server_2022
- windows_10_22h2
- windows_server_2016
- windows_10_1809
- .net_framework
- windows_server_2008
CWE
