Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2519 | Visual Studio Remote Code Execution Vulnerability |
Github GHSA |
GHSA-h7jm-g87p-5935 | Microsoft Security Advisory CVE-2023-36796: .NET Remote Code Execution Vulnerability |
Thu, 30 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 01 Jan 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:microsoft:.net:3.0:sp2:*:*:*:*:*:* cpe:2.3:a:microsoft:.net:3.5.1:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net:3.5:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net:4.6.2:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net:4.7.2:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net:4.8.1:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net:4.8:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:microsoft:powershell:7.2:*:*:*:*:*:*:* cpe:2.3:a:microsoft:visual_studio:2013:update_5:*:*:*:*:*:* cpe:2.3:a:microsoft:visual_studio:2015:update3:*:*:*:*:*:* cpe:2.3:a:microsoft:visual_studio:2022:*:*:*:*:*:*:* cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:* cpe:2.3:a:microsoft:visual_studio_2022:17.4:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft powershell
Microsoft visual Studio |
Subscriptions
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2025-10-30T18:18:08.271Z
Reserved: 2023-06-27T15:11:59.873Z
Link: CVE-2023-36796
Updated: 2024-08-02T17:01:09.624Z
Status : Modified
Published: 2023-09-12T17:15:15.173
Modified: 2024-11-21T08:10:36.770
Link: CVE-2023-36796
OpenCVE Enrichment
No data.
EUVD
Github GHSA