### [CVE-2024-38081](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38081) ![](https://img.shields.io/static/v1?label=Product&message=.NET%206.0&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20.NET%20Framework%202.0%20Service%20Pack%202&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20.NET%20Framework%203.0%20Service%20Pack%202&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20.NET%20Framework%203.5%20AND%204.7.2&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20.NET%20Framework%203.5%20AND%204.8&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20.NET%20Framework%203.5%20AND%204.8.1&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20.NET%20Framework%203.5&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20.NET%20Framework%203.5.1&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20.NET%20Framework%204.6%2F4.6.2&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20.NET%20Framework%204.6.2%2F4.7%2F4.7.1%2F4.7.2&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20.NET%20Framework%204.6.2&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20.NET%20Framework%204.8&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Visual%20Studio%202022%20version%2017.4&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Visual%20Studio%202022%20version%2017.6&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Visual%20Studio%202022%20version%2017.8&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=10.0.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=17.4.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=17.6.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=17.8.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=2.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=3.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=3.5.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=4.7.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=4.8.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=4.8.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20('Link%20Following')&color=brightgreen) ### Description .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability ### POC #### Reference No PoCs from references. #### Github - https://github.com/MOHAN-SINGH-0/cybersecurity-Task-3 - https://github.com/fkie-cad/nvd-json-data-feeds