Filtered by vendor Microsoft
Subscriptions
Filtered by product Visual Studio 2022
Subscriptions
Total
99 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-24895 | 1 Microsoft | 15 .net, .net Framework, Visual Studio 2022 and 12 more | 2025-01-01 | 7.8 High |
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability | ||||
CVE-2023-24897 | 1 Microsoft | 18 .net, .net Framework, Visual Studio and 15 more | 2025-01-01 | 7.8 High |
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability | ||||
CVE-2023-23381 | 1 Microsoft | 3 Visual Studio 2017, Visual Studio 2019, Visual Studio 2022 | 2025-01-01 | 7.8 High |
Visual Studio Remote Code Execution Vulnerability | ||||
CVE-2023-21815 | 1 Microsoft | 3 Visual Studio 2017, Visual Studio 2019, Visual Studio 2022 | 2025-01-01 | 7.8 High |
Visual Studio Remote Code Execution Vulnerability | ||||
CVE-2023-21567 | 1 Microsoft | 3 Visual Studio 2017, Visual Studio 2019, Visual Studio 2022 | 2025-01-01 | 5.6 Medium |
Visual Studio Denial of Service Vulnerability | ||||
CVE-2023-21566 | 1 Microsoft | 3 Visual Studio 2017, Visual Studio 2019, Visual Studio 2022 | 2025-01-01 | 7.8 High |
Visual Studio Elevation of Privilege Vulnerability | ||||
CVE-2024-26190 | 1 Microsoft | 8 .net, Powershell, Visual Studio 2022 and 5 more | 2024-12-31 | 7.5 High |
Microsoft QUIC Denial of Service Vulnerability | ||||
CVE-2024-21392 | 2 Microsoft, Redhat | 4 .net, Powershell, Visual Studio 2022 and 1 more | 2024-12-31 | 7.5 High |
.NET and Visual Studio Denial of Service Vulnerability | ||||
CVE-2024-30052 | 1 Microsoft | 2 Visual Studio 2019, Visual Studio 2022 | 2024-12-31 | 4.7 Medium |
Visual Studio Remote Code Execution Vulnerability | ||||
CVE-2024-29060 | 1 Microsoft | 3 Visual Studio 2017, Visual Studio 2019, Visual Studio 2022 | 2024-12-31 | 6.7 Medium |
Visual Studio Elevation of Privilege Vulnerability | ||||
CVE-2024-21404 | 2 Microsoft, Redhat | 5 Asp.net Core, Visual Studio 2022, Enterprise Linux and 2 more | 2024-12-31 | 7.5 High |
.NET Denial of Service Vulnerability | ||||
CVE-2024-21386 | 2 Microsoft, Redhat | 4 Asp.net Core, Visual Studio 2022, Enterprise Linux and 1 more | 2024-12-31 | 7.5 High |
.NET Denial of Service Vulnerability | ||||
CVE-2024-21319 | 2 Microsoft, Redhat | 5 .net, Identity Model, Visual Studio 2022 and 2 more | 2024-12-31 | 6.8 Medium |
Microsoft Identity Denial of service vulnerability | ||||
CVE-2024-20656 | 1 Microsoft | 4 Visual Studio, Visual Studio 2017, Visual Studio 2019 and 1 more | 2024-12-31 | 7.8 High |
Visual Studio Elevation of Privilege Vulnerability | ||||
CVE-2024-0057 | 2 Microsoft, Redhat | 19 .net, .net Framework, Powershell and 16 more | 2024-12-31 | 9.1 Critical |
NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability | ||||
CVE-2024-0056 | 2 Microsoft, Redhat | 21 .net, .net Framework, Microsoft.data.sqlclient and 18 more | 2024-12-31 | 8.7 High |
Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability | ||||
CVE-2022-24767 | 2 Git For Windows Project, Microsoft | 4 Git For Windows, Visual Studio 2017, Visual Studio 2019 and 1 more | 2024-11-21 | 7.8 High |
GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account. | ||||
CVE-2021-43877 | 1 Microsoft | 3 Asp.net Core, Visual Studio 2019, Visual Studio 2022 | 2024-11-21 | 8.8 High |
ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability | ||||
CVE-2020-8927 | 7 Canonical, Debian, Fedoraproject and 4 more | 12 Ubuntu Linux, Debian Linux, Fedora and 9 more | 2024-11-21 | 5.3 Medium |
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. |