cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-43603,https://securityvulnerability.io/vulnerability/CVE-2024-43603,Visual Studio Collector Service Denial of Service Vulnerability,Visual Studio Collector Service Denial of Service Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.11,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2015 Update 3",5.5,MEDIUM,0.0004799999878741801,false,false,false,false,,false,false,2024-10-08T17:36:17.098Z,0 CVE-2024-20656,https://securityvulnerability.io/vulnerability/CVE-2024-20656,Elevation of Privilege Vulnerability Affects Visual Studio,"An elevation of privilege vulnerability exists in Visual Studio, which could allow an attacker to execute arbitrary code with elevated permissions. By exploiting this vulnerability, attackers can gain unauthorized access to sensitive information and impact system integrity. It's essential for organizations using affected versions to apply appropriate security updates promptly to mitigate potential risks and enhance the overall security posture.",Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2015 Update 3",7.8,HIGH,0.0005300000193528831,false,true,false,true,true,true,false,2024-01-09T18:15:00.000Z,473 CVE-2023-36796,https://securityvulnerability.io/vulnerability/CVE-2023-36796,Visual Studio Remote Code Execution Vulnerability,Visual Studio Remote Code Execution Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.7,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2013 Update 5,Microsoft Visual Studio 2015 Update 3,.net 7.0,.net 6.0,Powershell 7.2,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.8,HIGH,0.002240000059828162,false,false,false,false,,false,false,2023-09-12T17:15:00.000Z,0 CVE-2023-24897,https://securityvulnerability.io/vulnerability/CVE-2023-24897,".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2013 Update 5,Microsoft Visual Studio 2015 Update 3,.net 7.0,.net 6.0,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2",7.8,HIGH,0.0017300000181421638,false,true,false,false,,false,false,2023-06-14T15:15:00.000Z,0 CVE-2023-33139,https://securityvulnerability.io/vulnerability/CVE-2023-33139,Visual Studio Information Disclosure Vulnerability,Visual Studio Information Disclosure Vulnerability,Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2013 Update 5,Microsoft Visual Studio 2015 Update 3,Microsoft Visual Studio 2022 Version 17.6",5.5,MEDIUM,0.0006900000153109431,false,false,false,false,,false,false,2023-06-14T00:15:00.000Z,0 CVE-2023-21815,https://securityvulnerability.io/vulnerability/CVE-2023-21815,Visual Studio Remote Code Execution Vulnerability,Visual Studio Remote Code Execution Vulnerability,Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2013 Update 5,Microsoft Visual Studio 2015 Update 3,Microsoft Visual Studio 2022 Version 17.4",7.8,HIGH,0.0028699999675154686,false,false,false,false,,false,false,2023-02-14T21:15:00.000Z,0 CVE-2023-23381,https://securityvulnerability.io/vulnerability/CVE-2023-23381,Visual Studio Remote Code Execution Vulnerability,Visual Studio Remote Code Execution Vulnerability,Microsoft,"Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2013 Update 5,Microsoft Visual Studio 2015 Update 3",7.8,HIGH,0.0028699999675154686,false,false,false,false,,false,false,2023-02-14T21:15:00.000Z,0 CVE-2023-21808,https://securityvulnerability.io/vulnerability/CVE-2023-21808,.NET and Visual Studio Remote Code Execution Vulnerability,.NET and Visual Studio Remote Code Execution Vulnerability,Microsoft,"Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2015 Update 3,Microsoft Visual Studio 2013 Update 5,.net 7.0,.net 6.0,Powershell 7.2,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2",7.8,HIGH,0.0028699999675154686,false,false,false,false,,false,false,2023-02-14T21:15:00.000Z,0 CVE-2022-35827,https://securityvulnerability.io/vulnerability/CVE-2022-35827,Visual Studio Remote Code Execution Vulnerability,Visual Studio Remote Code Execution Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2015 Update 3,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Microsoft Visual Studio 2013 Update 5,Microsoft Visual Studio 2012 Update 5",8.8,HIGH,0.016189999878406525,false,false,false,false,,false,false,2022-08-09T20:12:50.000Z,0 CVE-2022-35826,https://securityvulnerability.io/vulnerability/CVE-2022-35826,Visual Studio Remote Code Execution Vulnerability,Visual Studio Remote Code Execution Vulnerability,Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2012 Update 5,Microsoft Visual Studio 2013 Update 5,Microsoft Visual Studio 2015 Update 3,Microsoft Visual Studio 2022 Version 17.2",8.8,HIGH,0.016189999878406525,false,false,false,false,,false,false,2022-08-09T20:12:36.000Z,0 CVE-2022-35825,https://securityvulnerability.io/vulnerability/CVE-2022-35825,Visual Studio Remote Code Execution Vulnerability,Visual Studio Remote Code Execution Vulnerability,Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2012 Update 5,Microsoft Visual Studio 2013 Update 5,Microsoft Visual Studio 2015 Update 3,Microsoft Visual Studio 2022 Version 17.2",8.8,HIGH,0.006639999803155661,false,false,false,false,,false,false,2022-08-09T20:12:22.000Z,0 CVE-2022-35777,https://securityvulnerability.io/vulnerability/CVE-2022-35777,Visual Studio Remote Code Execution Vulnerability,Visual Studio Remote Code Execution Vulnerability,Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2012 Update 5,Microsoft Visual Studio 2013 Update 5,Microsoft Visual Studio 2015 Update 3,Microsoft Visual Studio 2022 Version 17.2",8.8,HIGH,0.016189999878406525,false,false,false,false,,false,false,2022-08-09T19:59:23.000Z,0 CVE-2022-21871,https://securityvulnerability.io/vulnerability/CVE-2022-21871,Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability,Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1909,Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Microsoft Visual Studio 2015 Update 3",7,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2022-01-11T20:22:40.000Z,0 CVE-2021-42277,https://securityvulnerability.io/vulnerability/CVE-2021-42277,Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability,Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1909,Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 2004,Windows Server Version 2004,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2015 Update 3",5.5,MEDIUM,0.0008099999977275729,false,false,false,false,,false,false,2021-11-10T00:47:02.000Z,0 CVE-2021-28322,https://securityvulnerability.io/vulnerability/CVE-2021-28322,Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability,Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1803,Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1909,Windows Server, Version 1909 (server Core Installation),Windows 10 Version 2004,Windows Server Version 2004,Windows 10 Version 20h2,Windows Server Version 20h2,Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Microsoft Visual Studio 2015 Update 3",7.8,HIGH,0.025629999116063118,false,false,false,false,,false,false,2021-04-13T19:32:56.000Z,0 CVE-2021-28321,https://securityvulnerability.io/vulnerability/CVE-2021-28321,Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability,Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1803,Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1909,Windows Server, Version 1909 (server Core Installation),Windows 10 Version 2004,Windows Server Version 2004,Windows 10 Version 20h2,Windows Server Version 20h2,Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Microsoft Visual Studio 2015 Update 3",7.8,HIGH,0.025629999116063118,false,false,false,false,,false,false,2021-04-13T19:32:55.000Z,0 CVE-2021-28313,https://securityvulnerability.io/vulnerability/CVE-2021-28313,Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability,Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1803,Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1909,Windows Server, Version 1909 (server Core Installation),Windows 10 Version 2004,Windows Server Version 2004,Windows 10 Version 20h2,Windows Server Version 20h2,Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Microsoft Visual Studio 2015 Update 3",7.8,HIGH,0.025629999116063118,false,false,false,false,,false,false,2021-04-13T19:32:49.000Z,0 CVE-2021-1680,https://securityvulnerability.io/vulnerability/CVE-2021-1680,Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability,Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 20h2,Windows Server Version 20h2,Windows 10 Version 1803,Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1909,Windows Server, Version 1909 (server Core Installation),Windows 10 Version 2004,Windows Server Version 2004,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Microsoft Visual Studio 2019 Version 16.8,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.0,Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Microsoft Visual Studio 2015 Update 3",7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2021-01-12T19:42:21.000Z,0 CVE-2021-1651,https://securityvulnerability.io/vulnerability/CVE-2021-1651,Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability,Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 20h2,Windows Server Version 20h2,Windows 10 Version 1803,Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1909,Windows Server, Version 1909 (server Core Installation),Windows 10 Version 2004,Windows Server Version 2004,Windows 10 Version 1607,Microsoft Visual Studio 2019 Version 16.8,Windows Server 2016,Windows Server 2016 (server Core Installation),Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.0,Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Microsoft Visual Studio 2015 Update 3",7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2021-01-12T19:42:03.000Z,0 CVE-2020-1133,https://securityvulnerability.io/vulnerability/CVE-2020-1133,Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability,"

An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

An attacker could exploit this vulnerability by running a specially crafted application on the victim system.

The update addresses the vulnerability by correcting the way the Diagnostics Hub Standard Collector handles file operations.

",Microsoft,"Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.0,Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2015 Update 3,Windows 10 Version 1803,Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1909,Windows Server, Version 1909 (server Core Installation),Windows 10 Version 1709 For 32-bit Systems,Windows 10 Version 1709,Windows 10 Version 1903 For 32-bit Systems,Windows 10 Version 1903 For X64-based Systems,Windows 10 Version 1903 For Arm64-based Systems,Windows Server, Version 1903 (server Core Installation),Windows 10 Version 2004,Windows Server Version 2004,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation)",5.5,MEDIUM,0.0006099999882280827,false,false,false,false,,false,false,2020-09-11T17:09:01.000Z,0 CVE-2020-1130,https://securityvulnerability.io/vulnerability/CVE-2020-1130,Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability,"

An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector improperly handles data operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

An attacker could exploit this vulnerability by running a specially crafted application on the victim system.

The update addresses the vulnerability by correcting the way the Diagnostics Hub Standard Collector handles data operations.

",Microsoft,"Windows 10 Version 1803,Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1909,Windows Server, Version 1909 (server Core Installation),Windows 10 Version 1709 For 32-bit Systems,Windows 10 Version 1709,Windows 10 Version 1903 For 32-bit Systems,Windows 10 Version 1903 For X64-based Systems,Windows 10 Version 1903 For Arm64-based Systems,Windows Server, Version 1903 (server Core Installation),Windows 10 Version 2004,Windows Server Version 2004,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.0,Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2015 Update 3",6.6,MEDIUM,0.0006099999882280827,false,false,false,false,,false,false,2020-09-11T17:09:01.000Z,0 CVE-2020-16874,https://securityvulnerability.io/vulnerability/CVE-2020-16874,Visual Studio Remote Code Execution Vulnerability,"

A remote code execution vulnerability exists in Visual Studio when it improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

To exploit the vulnerability, an attacker would have to convince a user to open a specially crafted file with an affected version of Visual Studio.

The update addresses the vulnerability by correcting how Visual Studio handles objects in memory.

",Microsoft,"Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.0,Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2012 Update 5,Microsoft Visual Studio 2013 Update 5,Microsoft Visual Studio 2015 Update 3",7.8,HIGH,0.02816000021994114,false,false,false,false,,false,false,2020-09-11T17:08:47.000Z,0 CVE-2020-16856,https://securityvulnerability.io/vulnerability/CVE-2020-16856,Visual Studio Remote Code Execution Vulnerability,"

A remote code execution vulnerability exists in Visual Studio when it improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

To exploit the vulnerability, an attacker would have to convince a user to open a specially crafted file with an affected version of Visual Studio.

The update addresses the vulnerability by correcting how Visual Studio handles objects in memory.

",Microsoft,"Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.0,Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2012 Update 5,Microsoft Visual Studio 2013 Update 5,Microsoft Visual Studio 2015 Update 3",7.8,HIGH,0.02816000021994114,false,false,false,false,,false,false,2020-09-11T17:08:40.000Z,0