ASP.NET and Visual Studio Security Feature Bypass Vulnerability
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 08:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVZVMMCCBBCSCPAW2CRQGOTKIHVFCMRO/ - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5CFOR6ID2HP45E7ZOGQNX76FPIWP7XR/ - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TLWNIIA2I6YCYVCXYBPBRSZ3UH6KILTG/ - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3VJRGNYJXGPF5LXUG3NL45QPK2UU6PL/ - Mailing List | |
References | () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170 - Patch, Vendor Advisory |
Information
Published : 2023-07-11 18:15
Updated : 2025-01-01 02:15
NVD link : CVE-2023-33170
Mitre link : CVE-2023-33170
CVE.ORG link : CVE-2023-33170
JSON object : View
Products Affected
microsoft
- .net
- visual_studio_2022
fedoraproject
- fedora
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')