cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-49044,https://securityvulnerability.io/vulnerability/CVE-2024-49044,Visual Studio Elevation of Privilege Vulnerability,Visual Studio Elevation of Privilege Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.11",6.7,MEDIUM,0.0006000000284984708,false,false,false,false,,false,false,2024-11-12T18:15:00.000Z,0 CVE-2024-43499,https://securityvulnerability.io/vulnerability/CVE-2024-43499,.NET and Visual Studio Denial of Service Vulnerability,"A vulnerability has been identified in .NET and Visual Studio that allows for a Denial of Service (DoS) attack. Attackers could potentially exploit this weakness, rendering affected applications unavailable. Users and administrators of .NET Framework and Visual Studio products must review security updates and implement necessary patches to mitigate potential risks and ensure system stability. For further technical details and remediation guidance, refer to the vendor advisory.",Microsoft,"Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.11,.net 9.0",7.5,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2024-11-12T18:15:00.000Z,0 CVE-2024-43498,https://securityvulnerability.io/vulnerability/CVE-2024-43498,.NET and Visual Studio Remote Code Execution Vulnerability,"A remote code execution vulnerability exists in the way that .NET and Visual Studio processes certain requests. This issue can allow an attacker to execute arbitrary code on the target machine, potentially gaining control over the system and compromising sensitive information. Users of affected versions should apply the necessary updates to mitigate this risk and protect their environments from potential exploitation.",Microsoft,"Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.11,.net 9.0",9.8,CRITICAL,0.0011399999493733048,false,false,false,false,,false,false,2024-11-12T18:15:00.000Z,0 CVE-2024-43603,https://securityvulnerability.io/vulnerability/CVE-2024-43603,Visual Studio Collector Service Denial of Service Vulnerability,Visual Studio Collector Service Denial of Service Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.11,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2015 Update 3",5.5,MEDIUM,0.0004799999878741801,false,false,false,false,,false,false,2024-10-08T17:36:17.098Z,0 CVE-2024-43590,https://securityvulnerability.io/vulnerability/CVE-2024-43590,Elevation of Privilege Vulnerability Affects Visual C++ Users,"An elevation of privilege vulnerability exists within the Visual C++ Redistributable Installer, allowing attackers to exploit this flaw to gain elevated permissions on affected systems. This vulnerability can potentially enable unauthorized access and control over system resources, impacting system security and integrity. Users and administrators are advised to review their installed versions of the Visual C++ Redistributable and apply necessary patches in order to mitigate associated risks.",Microsoft,"Visual C++ Redistributable Installer,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.11",7.8,HIGH,0.0004799999878741801,false,false,false,false,,false,false,2024-10-08T17:36:14.169Z,0 CVE-2024-43485,https://securityvulnerability.io/vulnerability/CVE-2024-43485,.NET and Visual Studio Denial of Service Vulnerability,"The vulnerability identified allows attackers to exploit a flaw in .NET and Visual Studio, enabling a denial of service attack. By sending specially crafted requests to an affected system, an attacker could cause significant disruption, affecting service availability for users. This vulnerability poses a potential risk to organizations relying on these widely used development tools, necessitating prompt attention to safeguard systems. Regular updates and patches should be prioritized to mitigate potential impacts associated with this vulnerability.",Microsoft,"Powershell 7.2,Powershell 7.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.11,.net 8.0,.net 6.0",7.5,HIGH,0.0008999999845400453,false,false,false,false,,false,false,2024-10-08T17:35:47.290Z,0 CVE-2024-43484,https://securityvulnerability.io/vulnerability/CVE-2024-43484,".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability","A vulnerability in the .NET Framework and Visual Studio has the potential to lead to a denial of service condition. This issue can affect applications utilizing these platforms, causing unexpected behavior or crashes during operation. Developers and organizations using .NET technologies must be vigilant and consider mitigation strategies to protect their software development lifecycle. It's crucial to apply the latest patches and updates provided by Microsoft to safeguard against this vulnerability.",Microsoft,"Powershell 7.2,Powershell 7.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.11,.net 6.0,.net 8.0,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 4.6/4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1,Microsoft .net Framework 4.8",7.5,HIGH,0.0008999999845400453,false,false,false,false,,false,false,2024-10-08T17:35:46.715Z,0 CVE-2024-43483,https://securityvulnerability.io/vulnerability/CVE-2024-43483,".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability","A Denial of Service vulnerability exists in the .NET Framework and Visual Studio products, potentially allowing an attacker to disrupt service availability. This could lead to an application's inability to respond to requests, impacting users and service reliability. Proper patches and updates are essential to mitigate any potential exploitation of this vulnerability. For further information and specific updates, please consult the vendor advisory.",Microsoft,"Powershell 7.2,Powershell 7.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.11,.net 8.0,.net 6.0,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 4.6/4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.5,HIGH,0.0008999999845400453,false,false,false,false,,false,false,2024-10-08T17:35:46.198Z,0 CVE-2024-38229,https://securityvulnerability.io/vulnerability/CVE-2024-38229,.NET and Visual Studio Remote Code Execution Vulnerability,This vulnerability in .NET and Visual Studio could allow an attacker to execute arbitrary code on a system if a user opens a specially crafted project file or accesses a malicious web page. This risk emphasizes the importance of maintaining up-to-date security practices and patches to safeguard development environments from potential exploits.,Microsoft,"Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,.net 8.0,Microsoft Visual Studio 2022 Version 17.11",8.1,HIGH,0.0015699999639764428,false,false,false,false,,false,false,2024-10-08T17:35:16.768Z,0 CVE-2024-38168,https://securityvulnerability.io/vulnerability/CVE-2024-38168,.NET and Visual Studio Denial of Service Vulnerability,"A Denial of Service vulnerability exists in the .NET Framework and Visual Studio, which may allow an attacker to disrupt the normal operation of applications built with these tools. Exploitation of this vulnerability could lead to crashes or unresponsive systems, impairing user experience and potentially impacting critical business functions. Mitigation strategies and updates are necessary to ensure robust protection against this vulnerability.",Microsoft,".net 8.0,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.8",7.5,HIGH,0.0008399999933317304,false,false,false,false,,false,false,2024-08-13T17:29:49.113Z,0 CVE-2024-38167,https://securityvulnerability.io/vulnerability/CVE-2024-38167,.NET and Visual Studio Information Disclosure Vulnerability,.NET and Visual Studio Information Disclosure Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.8,.net 8.0,Microsoft Visual Studio 2022 Version 17.6",6.5,MEDIUM,0.0012199999764561653,false,false,false,false,,false,false,2024-08-13T17:29:48.525Z,0 CVE-2024-38095,https://securityvulnerability.io/vulnerability/CVE-2024-38095,.NET and Visual Studio Denial of Service Vulnerability,"A vulnerability has been identified in .NET and Visual Studio that can lead to a Denial of Service condition. This issue arises from certain conditions in the way these products handle input, potentially allowing an attacker to disrupt the services provided by applications built on the .NET Framework or those using Visual Studio. Implementing the necessary security updates and best practices is recommended to mitigate the risks associated with this vulnerability.",Microsoft,"Powershell 7.4,Powershell 7.2,.net 6.0,.net 8.0,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10",7.5,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-07-09T17:15:00.000Z,0 CVE-2024-35272,https://securityvulnerability.io/vulnerability/CVE-2024-35272,SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability,"The SQL Server Native Client OLE DB Provider contains a vulnerability that allows remote code execution through crafted input. Attackers with the ability to send a specially crafted request to an affected SQL Server could exploit this vulnerability, potentially leading to unauthorized access and control over systems. Proper patching of affected systems is crucial to mitigate risks associated with this vulnerability, as it can expose sensitive data and compromise system integrity. For more details, refer to Microsoft's advisory.",Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.11,Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2016 Service Pack 3 (gdr),Microsoft Sql Server 2016 Service Pack 3 Azure Connect Feature Pack,Microsoft Sql Server 2017 (cu 31),Microsoft Sql Server 2022 (gdr),Microsoft Sql Server 2019 For X64-based Systems (cu 27),Microsoft Sql Server 2022 For (cu 13)",8.8,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-07-09T17:15:00.000Z,0 CVE-2024-35264,https://securityvulnerability.io/vulnerability/CVE-2024-35264,.NET and Visual Studio Remote Code Execution Vulnerability,"A vulnerability in .NET and Visual Studio allows for remote code execution, presenting risks for developers and systems using these platforms. Attackers may exploit this flaw to execute arbitrary code in the context of the user running the vulnerable application. This could lead to unauthorized actions taken on behalf of the user. It is crucial for organizations to address this vulnerability by applying available patches and implementing best practices for secure coding and application deployment.",Microsoft,".net 6.0,.net 8.0,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.6",8.1,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-07-09T17:15:00.000Z,0 CVE-2024-30105,https://securityvulnerability.io/vulnerability/CVE-2024-30105,.NET and Visual Studio Denial of Service Vulnerability,"A Denial of Service vulnerability has been identified in the .NET Framework and Visual Studio, which could allow an attacker to cause the application to become unresponsive. This flaw, present in certain versions of both .NET and Visual Studio, may be exploited under specific conditions, leading to potential service interruptions for users. Organizations utilizing these tools need to be aware of this vulnerability and assess their risk, implementing any recommended security updates to mitigate exposure.",Microsoft,".net 8.0,Powershell 7.4,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.8",7.5,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-07-09T17:15:00.000Z,0 CVE-2024-30052,https://securityvulnerability.io/vulnerability/CVE-2024-30052,Visual Studio Remote Code Execution Vulnerability,"The article discusses a remote code execution vulnerability in Visual Studio (CVE-2024-30052), which allows attackers to exploit the software by manipulating dump files during debugging sessions. The vulnerability poses the risk of executing arbitrary code and potentially exposing sensitive information. The article highlights the importance of addressing security vulnerabilities in debugging tools to prevent potential attacks and emphasizes the need for careful validation and sanitization of embedded source files. Additionally, the article describes the use of various file extensions to potentially execute arbitrary code on a Windows system, including CHM, HTA, and PY files. While it is not mentioned whether ransomware groups have exploited this vulnerability, the potential impact of this vulnerability is significant.",Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10",4.7,MEDIUM,0.0005300000193528831,false,true,false,true,true,false,false,2024-06-11T17:00:10.658Z,0 CVE-2024-29060,https://securityvulnerability.io/vulnerability/CVE-2024-29060,Elevation of Privilege Vulnerability Affects Visual Studio,Visual Studio Elevation of Privilege Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8",6.7,MEDIUM,0.0004799999878741801,false,false,false,false,,false,false,2024-06-11T16:59:48.371Z,0