cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-49044,https://securityvulnerability.io/vulnerability/CVE-2024-49044,Visual Studio Elevation of Privilege Vulnerability,Visual Studio Elevation of Privilege Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.11",6.7,MEDIUM,0.0006000000284984708,false,false,false,false,,false,false,2024-11-12T18:15:00.000Z,0 CVE-2024-43498,https://securityvulnerability.io/vulnerability/CVE-2024-43498,.NET and Visual Studio Remote Code Execution Vulnerability,"A remote code execution vulnerability exists in the way that .NET and Visual Studio processes certain requests. This issue can allow an attacker to execute arbitrary code on the target machine, potentially gaining control over the system and compromising sensitive information. Users of affected versions should apply the necessary updates to mitigate this risk and protect their environments from potential exploitation.",Microsoft,"Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.11,.net 9.0",9.8,CRITICAL,0.0011399999493733048,false,false,false,false,,false,false,2024-11-12T18:15:00.000Z,0 CVE-2024-43499,https://securityvulnerability.io/vulnerability/CVE-2024-43499,.NET and Visual Studio Denial of Service Vulnerability,"A vulnerability has been identified in .NET and Visual Studio that allows for a Denial of Service (DoS) attack. Attackers could potentially exploit this weakness, rendering affected applications unavailable. Users and administrators of .NET Framework and Visual Studio products must review security updates and implement necessary patches to mitigate potential risks and ensure system stability. For further technical details and remediation guidance, refer to the vendor advisory.",Microsoft,"Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.11,.net 9.0",7.5,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2024-11-12T18:15:00.000Z,0 CVE-2024-43603,https://securityvulnerability.io/vulnerability/CVE-2024-43603,Visual Studio Collector Service Denial of Service Vulnerability,Visual Studio Collector Service Denial of Service Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.11,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2015 Update 3",5.5,MEDIUM,0.0004799999878741801,false,false,false,false,,false,false,2024-10-08T17:36:17.098Z,0 CVE-2024-43590,https://securityvulnerability.io/vulnerability/CVE-2024-43590,Elevation of Privilege Vulnerability Affects Visual C++ Users,"An elevation of privilege vulnerability exists within the Visual C++ Redistributable Installer, allowing attackers to exploit this flaw to gain elevated permissions on affected systems. This vulnerability can potentially enable unauthorized access and control over system resources, impacting system security and integrity. Users and administrators are advised to review their installed versions of the Visual C++ Redistributable and apply necessary patches in order to mitigate associated risks.",Microsoft,"Visual C++ Redistributable Installer,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.11",7.8,HIGH,0.0004799999878741801,false,false,false,false,,false,false,2024-10-08T17:36:14.169Z,0 CVE-2024-43485,https://securityvulnerability.io/vulnerability/CVE-2024-43485,.NET and Visual Studio Denial of Service Vulnerability,"The vulnerability identified allows attackers to exploit a flaw in .NET and Visual Studio, enabling a denial of service attack. By sending specially crafted requests to an affected system, an attacker could cause significant disruption, affecting service availability for users. This vulnerability poses a potential risk to organizations relying on these widely used development tools, necessitating prompt attention to safeguard systems. Regular updates and patches should be prioritized to mitigate potential impacts associated with this vulnerability.",Microsoft,"Powershell 7.2,Powershell 7.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.11,.net 8.0,.net 6.0",7.5,HIGH,0.0008999999845400453,false,false,false,false,,false,false,2024-10-08T17:35:47.290Z,0 CVE-2024-43484,https://securityvulnerability.io/vulnerability/CVE-2024-43484,".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability","A vulnerability in the .NET Framework and Visual Studio has the potential to lead to a denial of service condition. This issue can affect applications utilizing these platforms, causing unexpected behavior or crashes during operation. Developers and organizations using .NET technologies must be vigilant and consider mitigation strategies to protect their software development lifecycle. It's crucial to apply the latest patches and updates provided by Microsoft to safeguard against this vulnerability.",Microsoft,"Powershell 7.2,Powershell 7.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.11,.net 6.0,.net 8.0,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 4.6/4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1,Microsoft .net Framework 4.8",7.5,HIGH,0.0008999999845400453,false,false,false,false,,false,false,2024-10-08T17:35:46.715Z,0 CVE-2024-43483,https://securityvulnerability.io/vulnerability/CVE-2024-43483,".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability","A Denial of Service vulnerability exists in the .NET Framework and Visual Studio products, potentially allowing an attacker to disrupt service availability. This could lead to an application's inability to respond to requests, impacting users and service reliability. Proper patches and updates are essential to mitigate any potential exploitation of this vulnerability. For further information and specific updates, please consult the vendor advisory.",Microsoft,"Powershell 7.2,Powershell 7.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.11,.net 8.0,.net 6.0,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 4.6/4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.5,HIGH,0.0008999999845400453,false,false,false,false,,false,false,2024-10-08T17:35:46.198Z,0 CVE-2024-38229,https://securityvulnerability.io/vulnerability/CVE-2024-38229,.NET and Visual Studio Remote Code Execution Vulnerability,This vulnerability in .NET and Visual Studio could allow an attacker to execute arbitrary code on a system if a user opens a specially crafted project file or accesses a malicious web page. This risk emphasizes the importance of maintaining up-to-date security practices and patches to safeguard development environments from potential exploits.,Microsoft,"Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,.net 8.0,Microsoft Visual Studio 2022 Version 17.11",8.1,HIGH,0.0015699999639764428,false,false,false,false,,false,false,2024-10-08T17:35:16.768Z,0 CVE-2024-35272,https://securityvulnerability.io/vulnerability/CVE-2024-35272,SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability,"The SQL Server Native Client OLE DB Provider contains a vulnerability that allows remote code execution through crafted input. Attackers with the ability to send a specially crafted request to an affected SQL Server could exploit this vulnerability, potentially leading to unauthorized access and control over systems. Proper patching of affected systems is crucial to mitigate risks associated with this vulnerability, as it can expose sensitive data and compromise system integrity. For more details, refer to Microsoft's advisory.",Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.11,Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2016 Service Pack 3 (gdr),Microsoft Sql Server 2016 Service Pack 3 Azure Connect Feature Pack,Microsoft Sql Server 2017 (cu 31),Microsoft Sql Server 2022 (gdr),Microsoft Sql Server 2019 For X64-based Systems (cu 27),Microsoft Sql Server 2022 For (cu 13)",8.8,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-07-09T17:15:00.000Z,0