cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-30105,https://securityvulnerability.io/vulnerability/CVE-2024-30105,.NET and Visual Studio Denial of Service Vulnerability,"A Denial of Service vulnerability has been identified in the .NET Framework and Visual Studio, which could allow an attacker to cause the application to become unresponsive. This flaw, present in certain versions of both .NET and Visual Studio, may be exploited under specific conditions, leading to potential service interruptions for users. Organizations utilizing these tools need to be aware of this vulnerability and assess their risk, implementing any recommended security updates to mitigate exposure.",Microsoft,".net 8.0,Powershell 7.4,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.8",7.5,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-07-09T17:15:00.000Z,0 CVE-2024-35264,https://securityvulnerability.io/vulnerability/CVE-2024-35264,.NET and Visual Studio Remote Code Execution Vulnerability,"A vulnerability in .NET and Visual Studio allows for remote code execution, presenting risks for developers and systems using these platforms. Attackers may exploit this flaw to execute arbitrary code in the context of the user running the vulnerable application. This could lead to unauthorized actions taken on behalf of the user. It is crucial for organizations to address this vulnerability by applying available patches and implementing best practices for secure coding and application deployment.",Microsoft,".net 6.0,.net 8.0,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2022 Version 17.6",8.1,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-07-09T17:15:00.000Z,0 CVE-2024-38095,https://securityvulnerability.io/vulnerability/CVE-2024-38095,.NET and Visual Studio Denial of Service Vulnerability,"A vulnerability has been identified in .NET and Visual Studio that can lead to a Denial of Service condition. This issue arises from certain conditions in the way these products handle input, potentially allowing an attacker to disrupt the services provided by applications built on the .NET Framework or those using Visual Studio. Implementing the necessary security updates and best practices is recommended to mitigate the risks associated with this vulnerability.",Microsoft,"Powershell 7.4,Powershell 7.2,.net 6.0,.net 8.0,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10",7.5,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-07-09T17:15:00.000Z,0 CVE-2024-38081,https://securityvulnerability.io/vulnerability/CVE-2024-38081,".NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability","The vulnerability in .NET, .NET Framework, and Visual Studio allows an attacker to exploit the system and gain elevated privileges. By leveraging this security flaw, malicious actors can execute unauthorized commands and access sensitive data, potentially compromising the integrity and confidentiality of the system. This highlights the importance of prompt security updates and good practices in maintaining software integrity to safeguard against unauthorized exploitation.",Microsoft,"Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,.net 6.0,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 4.6/4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2",7.3,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-07-09T17:15:00.000Z,0 CVE-2024-30052,https://securityvulnerability.io/vulnerability/CVE-2024-30052,Visual Studio Remote Code Execution Vulnerability,"The article discusses a remote code execution vulnerability in Visual Studio (CVE-2024-30052), which allows attackers to exploit the software by manipulating dump files during debugging sessions. The vulnerability poses the risk of executing arbitrary code and potentially exposing sensitive information. The article highlights the importance of addressing security vulnerabilities in debugging tools to prevent potential attacks and emphasizes the need for careful validation and sanitization of embedded source files. Additionally, the article describes the use of various file extensions to potentially execute arbitrary code on a Windows system, including CHM, HTA, and PY files. While it is not mentioned whether ransomware groups have exploited this vulnerability, the potential impact of this vulnerability is significant.",Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2022 Version 17.10",4.7,MEDIUM,0.0005300000193528831,false,true,false,true,true,false,false,2024-06-11T17:00:10.658Z,0 CVE-2024-29060,https://securityvulnerability.io/vulnerability/CVE-2024-29060,Elevation of Privilege Vulnerability Affects Visual Studio,Visual Studio Elevation of Privilege Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.10,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8",6.7,MEDIUM,0.0004799999878741801,false,false,false,false,,false,false,2024-06-11T16:59:48.371Z,0 CVE-2024-30046,https://securityvulnerability.io/vulnerability/CVE-2024-30046,Visual Studio Denial of Service Vulnerability Affects Developers Worldwide,Visual Studio Denial of Service Vulnerability,Microsoft,".net 7.0,.net 8.0,Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8",5.9,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-05-14T16:57:30.222Z,0 CVE-2024-30045,https://securityvulnerability.io/vulnerability/CVE-2024-30045,Remote Code Execution Vulnerability Affects .NET and Visual Studio,.NET and Visual Studio Remote Code Execution Vulnerability,Microsoft,".net 8.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Powershell 7.4",6.3,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-05-14T16:57:29.676Z,0 CVE-2024-28938,https://securityvulnerability.io/vulnerability/CVE-2024-28938,Remote Code Execution Vulnerability Affects Microsoft ODBC Driver for SQL Server,"The Microsoft ODBC Driver for SQL Server includes a vulnerability allowing for remote code execution, which enables attackers to execute arbitrary code on the targeted system. This flaw can be exploited via specially crafted requests, resulting in unauthorized access and potential manipulation of data. Users are urged to review their systems for the affected driver versions and consider applying necessary mitigations or updates to safeguard against potential threats.",Microsoft,"Microsoft Sql Server 2022 For (cu 12),Microsoft Sql Server 2019 (cu 25),Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2022 (gdr),Microsoft Odbc Driver 17 For Sql Server On Windows,Microsoft Odbc Driver 17 For Sql Server On Linux,Microsoft Odbc Driver 17 For Sql Server On Mac OS,Microsoft Odbc Driver 18 For Sql Server On Windows,Microsoft Odbc Driver 18 For Sql Server On Linux,Microsoft Odbc Driver 18 For Sql Server On Mac OS,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8",8.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-09T17:01:16.170Z,0 CVE-2024-28937,https://securityvulnerability.io/vulnerability/CVE-2024-28937,Remote Code Execution Vulnerability Affects Microsoft ODBC Driver for SQL Server,"A remote code execution vulnerability in the Microsoft ODBC Driver for SQL Server enables attackers to execute arbitrary code on the affected systems. This vulnerability arises from improper handling of input data by the driver, potentially allowing the execution of malicious scripts without user interaction. Organizations using affected versions of the ODBC Driver should prioritize applying relevant security updates to mitigate risks associated with this vulnerability. Security practitioners must ensure their systems are updated to protect against exploitation.",Microsoft,"Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2022 (gdr),Microsoft Odbc Driver 17 For Sql Server On Windows,Microsoft Odbc Driver 17 For Sql Server On Linux,Microsoft Odbc Driver 17 For Sql Server On Mac OS,Microsoft Odbc Driver 18 For Sql Server On Windows,Microsoft Odbc Driver 18 For Sql Server On Linux,Microsoft Odbc Driver 18 For Sql Server On Mac OS,Microsoft Sql Server 2019 (cu 25),Microsoft Sql Server 2022 For (cu 12),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8",8.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-09T17:01:15.620Z,0 CVE-2024-28935,https://securityvulnerability.io/vulnerability/CVE-2024-28935,Remote Code Execution Vulnerability Affects Microsoft ODBC Driver for SQL Server,"The Microsoft ODBC Driver for SQL Server has a vulnerability that allows remote code execution, impacting the integrity and security of systems utilizing this driver. Attackers could exploit this flaw to execute arbitrary commands on affected installations, posing significant risks to the confidentiality and availability of user data and server operations. It is crucial for organizations using affected versions of the driver to apply security updates and mitigate potential threats.",Microsoft,"Microsoft Sql Server 2019 (cu 25),Microsoft Sql Server 2022 For (cu 12),Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2022 (gdr),Microsoft Odbc Driver 17 For Sql Server On Windows,Microsoft Odbc Driver 17 For Sql Server On Linux,Microsoft Odbc Driver 17 For Sql Server On Mac OS,Microsoft Odbc Driver 18 For Sql Server On Windows,Microsoft Odbc Driver 18 For Sql Server On Linux,Microsoft Odbc Driver 18 For Sql Server On Mac OS,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8",8.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-09T17:01:15.096Z,0 CVE-2024-28934,https://securityvulnerability.io/vulnerability/CVE-2024-28934,Remote Code Execution Vulnerability Affects Microsoft ODBC Driver for SQL Server,"A significant remote code execution issue has been identified in the Microsoft ODBC Driver for SQL Server, which allows attackers to execute arbitrary code on affected systems. This vulnerability may arise when the driver does not properly validate input data. Successful exploitation could enable an attacker to take control of the system, potentially compromising the confidentiality, integrity, and availability of sensitive data. Organizations utilizing the affected versions should prioritize the implementation of security updates and patches to mitigate the risks associated with this vulnerability. For more information, refer to the detailed advisories provided by Microsoft.",Microsoft,"Microsoft Sql Server 2022 For (cu 12),Microsoft Sql Server 2019 (cu 25),Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2022 (gdr),Microsoft Odbc Driver 17 For Sql Server On Windows,Microsoft Odbc Driver 17 For Sql Server On Linux,Microsoft Odbc Driver 17 For Sql Server On Mac OS,Microsoft Odbc Driver 18 For Sql Server On Windows,Microsoft Odbc Driver 18 For Sql Server On Linux,Microsoft Odbc Driver 18 For Sql Server On Mac OS,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8",8.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-09T17:01:14.516Z,0 CVE-2024-28933,https://securityvulnerability.io/vulnerability/CVE-2024-28933,Remote Code Execution Vulnerability Affects Microsoft ODBC Driver for SQL Server,"A vulnerability exists in the Microsoft ODBC Driver for SQL Server, allowing an attacker to execute arbitrary code on the system using the affected driver. This issue can potentially lead to unauthorized access, data manipulation, and significant impacts on the integrity and availability of applications leveraging the ODBC Driver. Prompt application of security updates and adherence to recommended security practices are essential to mitigate risks associated with this vulnerability.",Microsoft,"Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Sql Server 2019 (cu 25),Microsoft Sql Server 2022 For (cu 12),Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2022 (gdr),Microsoft Odbc Driver 17 For Sql Server On Windows,Microsoft Odbc Driver 17 For Sql Server On Linux,Microsoft Odbc Driver 17 For Sql Server On Mac OS,Microsoft Odbc Driver 18 For Sql Server On Windows,Microsoft Odbc Driver 18 For Sql Server On Linux,Microsoft Odbc Driver 18 For Sql Server On Mac OS",8.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-09T17:01:13.955Z,0 CVE-2024-28930,https://securityvulnerability.io/vulnerability/CVE-2024-28930,Remote Code Execution Vulnerability Affects Microsoft ODBC Driver for SQL Server,"The vulnerability in the Microsoft ODBC Driver for SQL Server enables remote code execution, which could allow an attacker to execute arbitrary code on the affected system. This issue arises from improper validation of input data, leading to potential exploitation by malicious actors. Users of the Microsoft ODBC Driver for SQL Server are urged to review their systems for this vulnerability to mitigate risk and ensure their environments remain secure. For further details, consult the vendor advisory.",Microsoft,"Microsoft Sql Server 2019 (cu 25),Microsoft Sql Server 2022 For (cu 12),Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2022 (gdr),Microsoft Odbc Driver 17 For Sql Server On Windows,Microsoft Odbc Driver 17 For Sql Server On Linux,Microsoft Odbc Driver 17 For Sql Server On Mac OS,Microsoft Odbc Driver 18 For Sql Server On Windows,Microsoft Odbc Driver 18 For Sql Server On Linux,Microsoft Odbc Driver 18 For Sql Server On Mac OS,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8",8.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-09T17:01:13.416Z,0 CVE-2024-28936,https://securityvulnerability.io/vulnerability/CVE-2024-28936,Remote Code Execution Vulnerability Affects Microsoft ODBC Driver for SQL Server,"The vulnerability presents a potential risk within the Microsoft ODBC Driver for SQL Server, allowing for unauthorized remote code execution. Attackers may exploit this flaw to execute arbitrary code on the affected systems, potentially compromising sensitive data and leading to system instability. It is crucial for organizations using the affected versions to remain vigilant and apply necessary updates to safeguard their environments against potential exploitation threats.",Microsoft,"Microsoft Sql Server 2022 For (cu 12),Microsoft Sql Server 2019 (cu 25),Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2022 (gdr),Microsoft Odbc Driver 17 For Sql Server On Windows,Microsoft Odbc Driver 17 For Sql Server On Linux,Microsoft Odbc Driver 17 For Sql Server On Mac OS,Microsoft Odbc Driver 18 For Sql Server On Windows,Microsoft Odbc Driver 18 For Sql Server On Linux,Microsoft Odbc Driver 18 For Sql Server On Mac OS,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8",8.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-09T17:00:28.756Z,0 CVE-2024-28932,https://securityvulnerability.io/vulnerability/CVE-2024-28932,Remote Code Execution Vulnerability Affects Microsoft ODBC Driver for SQL Server,"A remote code execution vulnerability exists in the Microsoft ODBC Driver for SQL Server when the driver improperly handles specific requests. An attacker who successfully exploits this vulnerability could execute arbitrary code on the target system. This may allow the attacker to install programs, view, change, or delete data, or create new accounts with full user rights. To effectively mitigate this issue, it is crucial for users to ensure they are using the latest version of the Microsoft ODBC Driver for SQL Server and to apply any security updates provided by Microsoft.",Microsoft,"Microsoft Sql Server 2022 For (cu 12),Microsoft Sql Server 2019 (cu 25),Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2022 (gdr),Microsoft Odbc Driver 17 For Sql Server On Windows,Microsoft Odbc Driver 17 For Sql Server On Linux,Microsoft Odbc Driver 17 For Sql Server On Mac OS,Microsoft Odbc Driver 18 For Sql Server On Windows,Microsoft Odbc Driver 18 For Sql Server On Linux,Microsoft Odbc Driver 18 For Sql Server On Mac OS,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8",8.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-09T17:00:28.215Z,0 CVE-2024-28931,https://securityvulnerability.io/vulnerability/CVE-2024-28931,Remote Code Execution Vulnerability Affects Microsoft ODBC Driver for SQL Server,"The Microsoft ODBC Driver for SQL Server is susceptible to a remote code execution vulnerability that could allow attackers to execute arbitrary code on the affected system. The vulnerability arises during improper handling of certain requests, which may result in manipulation of the driver’s functionality. This issue affects multiple versions of the ODBC driver, and appropriate mitigations, such as updating to the latest version, are recommended to protect systems from potential exploitation. For further information and detailed guidance, refer to the Microsoft advisory.",Microsoft,"Microsoft Sql Server 2022 For (cu 12),Microsoft Sql Server 2019 (cu 25),Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2022 (gdr),Microsoft Odbc Driver 17 For Sql Server On Windows,Microsoft Odbc Driver 17 For Sql Server On Linux,Microsoft Odbc Driver 17 For Sql Server On Mac OS,Microsoft Odbc Driver 18 For Sql Server On Windows,Microsoft Odbc Driver 18 For Sql Server On Linux,Microsoft Odbc Driver 18 For Sql Server On Mac OS,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8",8.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-09T17:00:27.649Z,0 CVE-2024-28929,https://securityvulnerability.io/vulnerability/CVE-2024-28929,Remote Code Execution Vulnerability Affects Microsoft ODBC Driver for SQL Server,"The vulnerability in the Microsoft ODBC Driver for SQL Server allows an attacker to execute arbitrary code on the system running the affected driver. This security issue arises from improper handling of certain input data, which can be exploited by malicious users to create a specially crafted request. If successfully exploited, this vulnerability could lead to unauthorized access and control over the affected systems, compromising the integrity and confidentiality of the data handled by the SQL Server environment.",Microsoft,"Microsoft Sql Server 2019 (cu 25),Microsoft Sql Server 2022 For (cu 12),Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2022 (gdr),Microsoft Odbc Driver 17 For Sql Server On Windows,Microsoft Odbc Driver 17 For Sql Server On Linux,Microsoft Odbc Driver 17 For Sql Server On Mac OS,Microsoft Odbc Driver 18 For Sql Server On Windows,Microsoft Odbc Driver 18 For Sql Server On Linux,Microsoft Odbc Driver 18 For Sql Server On Mac OS,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8",8.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-09T17:00:27.042Z,0 CVE-2024-21409,https://securityvulnerability.io/vulnerability/CVE-2024-21409,Remote Code Execution Vulnerability Affects Microsoft Products,"A vulnerability has been identified in .NET, .NET Framework, and Visual Studio that allows for remote code execution. This flaw can enable an attacker to execute arbitrary code on the affected system, potentially leading to unauthorized access and control. The issue affects multiple versions of these platforms, requiring immediate attention from users to mitigate risks and safeguard sensitive data. Users are advised to apply the appropriate security updates as detailed in the vendor advisory.",Microsoft,"Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Powershell 7.3,Powershell 7.4,Powershell 7.2,.net 6.0,.net 7.0,.net 8.0,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2",7.3,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-09T17:00:08.248Z,0 CVE-2024-26190,https://securityvulnerability.io/vulnerability/CVE-2024-26190,Denial of Service Vulnerability in Microsoft QUIC Protocol,The Denial of Service vulnerability in Microsoft QUIC can allow an attacker to disrupt services by exploiting weaknesses in the protocol implementation. This vulnerability poses a risk to the availability of affected systems and may be leveraged in targeted attacks. Proper mitigation strategies should be employed to ensure network security and maintain service uptime. Organizations using Microsoft products that implement the QUIC protocol should closely monitor for updates and apply recommended security patches.,Microsoft,"Microsoft Visual Studio 2022 Version 17.9,Windows Server 2022,Windows 11 Version 21h2,Windows 11 Version 22h2,Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Powershell 7.3,Powershell 7.4,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,.net 7.0,.net 8.0",7.5,HIGH,0.0005200000014156103,false,false,false,false,,false,false,2024-03-12T16:57:52.923Z,0 CVE-2024-21392,https://securityvulnerability.io/vulnerability/CVE-2024-21392,.NET and Visual Studio Denial of Service Vulnerability,"This vulnerability in Microsoft .NET and Visual Studio allows an attacker to execute a denial of service attack, potentially disrupting application functionality and affecting the availability of services. Proper security measures, including timely updates and monitoring, are essential to mitigate risks associated with this vulnerability.",Microsoft,"Microsoft Visual Studio 2022 Version 17.9,Powershell 7.3,Powershell 7.4,.net 7.0,.net 8.0,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.8",7.5,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-03-12T16:57:42.012Z,0 CVE-2024-21404,https://securityvulnerability.io/vulnerability/CVE-2024-21404,.NET Denial of Service Vulnerability,"The .NET Denial of Service vulnerability presents risks that can allow attackers to disrupt the availability of affected applications by exploiting specific flaws in the .NET Framework. This can lead to interruptions in service and potentially expose sensitive information, impacting both system functionality and organizational operations. It is critical for users to address this vulnerability through timely updates and patching recommendations provided by Microsoft to ensure continued security and reliability of their systems.",Microsoft,".net 6.0,.net 7.0,.net 8.0,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8",7.5,HIGH,0.0019499999471008778,false,false,false,false,,false,false,2024-02-13T18:02:24.234Z,0 CVE-2024-21386,https://securityvulnerability.io/vulnerability/CVE-2024-21386,.NET Denial of Service Vulnerability,"A denial of service vulnerability in the Microsoft .NET Framework can potentially allow attackers to disrupt service availability. This flaw may allow malicious actors to cause applications to become unresponsive or crash through specific inputs. Proper mitigation strategies, including updates and patches provided by Microsoft, are vital in preventing exploitation of this vulnerability.",Microsoft,"Asp.net Core 6.0,Asp.net Core 7.0,Asp.net Core 8.0,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8",7.5,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-02-13T18:02:20.218Z,0 CVE-2024-21319,https://securityvulnerability.io/vulnerability/CVE-2024-21319,Microsoft Identity Denial of service vulnerability,"A denial of service vulnerability exists within Microsoft Identity, which could allow an attacker to impair the functions of the affected services. This vulnerability may lead to disruption in user authentication and application access, resulting in negative impacts on operations relying on these critical identity services. Organizations utilizing Microsoft Identity platforms must take necessary precautions to mitigate any potential exploitation of this vulnerability, ensuring the security and continuity of their operations.",Microsoft,".net 6.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.8,.net 7.0,.net 8.0,Microsoft Identity Model V6.0.0 Fornuget,Microsoft Identity Model V7.0.0 For Nuget,Microsoft Identity Model V6.0.0,Microsoft Identity Model V5.0.0,Microsoft Identity Model V7.0.0,Microsoft Identity Model V5.0.0 For Nuget",6.8,MEDIUM,0.0005300000193528831,false,false,false,false,,false,false,2024-01-09T18:59:01.270Z,0 CVE-2024-0056,https://securityvulnerability.io/vulnerability/CVE-2024-0056,Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability,"A security feature bypass vulnerability exists in Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Providers. This vulnerability allows an attacker to bypass security measures intended to restrict user access and control over SQL database activities. Successful exploitation could lead to unauthorized data access or manipulation, posing significant risks to the integrity and confidentiality of sensitive information. Organizations utilizing these data providers must assess their environment to apply necessary mitigations and protect their database systems.",Microsoft,"Microsoft Sql Server 2022 (gdr),.net 6.0,.net 7.0,.net 8.0,Microsoft.data.sqlclient,System.data.sqlclient,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Sql Server 2022 (cu 10),Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 2.0 Service Pack 2",8.7,HIGH,0.0005300000193528831,false,true,false,false,,false,false,2024-01-09T18:15:00.000Z,0