PT-2023-1443 · Microsoft +1 · .Net Framework +2
Goodbyeselene
·
Published
2023-02-14
·
Updated
2024-12-13
·
CVE-2023-21808
7.8
High
Base vector | Vector | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Microsoft .NET Framework and .NET (affected versions not specified)
Visual Studio (affected versions not specified)
Description:
The issue is related to insufficient protection of sensitive data during the implementation of debugging code in Microsoft .NET Framework and .NET. It allows a remote attacker to execute arbitrary code, potentially affecting the system.
Recommendations:
For Microsoft .NET Framework and .NET, at the moment, there is no information about a newer version that contains a fix for this vulnerability.
For Visual Studio, at the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
RCE
Use After Free
Related Identifiers
Affected Products
References · 138
- 🔥 https://github.com/bcdannyboy/CVE-2023-44487⭐ 237 🔗 49 · Exploit
- 🔥 https://github.com/imabee101/CVE-2023-44487⭐ 55 🔗 16 · Exploit
- 🔥 https://github.com/studiogangster/CVE-2023-44487⭐ 19 🔗 3 · Exploit
- 🔥 https://github.com/nxenon/cve-2023-44487⭐ 10 🔗 1 · Exploit
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36796 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/701242 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/704884 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/703507 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2023-44487 · Security Note
- https://bdu.fstec.ru/vul/2024-00281 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/701243 · Security Note
- https://bdu.fstec.ru/vul/2024-08707 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/696209 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/696308 · Security Note
- https://bdu.fstec.ru/vul/2024-01701 · Security Note