cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2022-26788,https://securityvulnerability.io/vulnerability/CVE-2022-26788,PowerShell Elevation of Privilege Vulnerability,PowerShell Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1909,Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 8.1,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation),Powershell 7.0,Powershell 7.1,Powershell 7.2",7.8,HIGH,0.0006699999794363976,false,false,false,false,,false,false,2022-04-15T19:04:25.000Z,0 CVE-2022-24512,https://securityvulnerability.io/vulnerability/CVE-2022-24512,.NET and Visual Studio Remote Code Execution Vulnerability,.NET and Visual Studio Remote Code Execution Vulnerability,Microsoft,"Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,.net 5.0,.net 6.0,.net Core 3.1,Powershell 7.2,Powershell 7.0,Powershell 7.1",6.3,MEDIUM,0.006479999981820583,false,false,false,false,,false,false,2022-03-09T17:08:15.000Z,0 CVE-2021-41355,https://securityvulnerability.io/vulnerability/CVE-2021-41355,.NET Core and Visual Studio Information Disclosure Vulnerability,.NET Core and Visual Studio Information Disclosure Vulnerability,Microsoft,"Powershell 7.1,Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),.net 5.0",5.7,MEDIUM,0.002469999948516488,false,false,false,false,,false,false,2021-10-13T00:28:19.000Z,0 CVE-2021-34485,https://securityvulnerability.io/vulnerability/CVE-2021-34485,.NET Core and Visual Studio Information Disclosure Vulnerability,.NET Core and Visual Studio Information Disclosure Vulnerability,Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Microsoft Visual Studio 2019 Version 16.10 (includes 16.0 - 16.9),Powershell 7.1,Powershell 7.0,.net Core 2.1,.net Core 3.1,.net 5.0",5,MEDIUM,0.0006099999882280827,false,false,false,false,,false,false,2021-08-12T18:11:57.000Z,0 CVE-2021-26423,https://securityvulnerability.io/vulnerability/CVE-2021-26423,.NET Core and Visual Studio Denial of Service Vulnerability,.NET Core and Visual Studio Denial of Service Vulnerability,Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Microsoft Visual Studio 2019 Version 16.10 (includes 16.0 - 16.9),Visual Studio 2019 For Mac Version 8.10,.net Core 2.1,.net Core 3.1,.net 5.0,Powershell Core 7.1,Powershell Core 7.0",7.5,HIGH,0.0024399999529123306,false,false,false,false,,false,false,2021-08-12T18:11:31.000Z,0 CVE-2021-26701,https://securityvulnerability.io/vulnerability/CVE-2021-26701,.NET Core Remote Code Execution Vulnerability,.NET Core Remote Code Execution Vulnerability,Microsoft,".net Core 2.1,.net Core 3.1,.net 5.0,Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Visual Studio 2019 For Mac,Microsoft Visual Studio 2019 Version 16.8 (includes 16.0 - 16.7),Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Powershell Core 7.1,Powershell Core 7.0",8.1,HIGH,0.131400004029274,false,false,false,false,,false,false,2021-02-25T23:02:00.000Z,0 CVE-2021-1721,https://securityvulnerability.io/vulnerability/CVE-2021-1721,.NET Core and Visual Studio Denial of Service Vulnerability,.NET Core and Visual Studio Denial of Service Vulnerability,Microsoft,"Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Powershell Core 7.1,Powershell Core 7.0,.net Core 2.1,.net Core 3.1,.net 5.0,Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2019 Version 16.8,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8)",6.5,MEDIUM,0.002580000087618828,false,false,false,false,,false,false,2021-02-25T23:01:26.000Z,0 CVE-2020-0951,https://securityvulnerability.io/vulnerability/CVE-2020-0951,Windows Defender Application Control Security Feature Bypass Vulnerability,"
A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement. An attacker who successfully exploited this vulnerability could execute PowerShell commands that would be blocked by WDAC.
To exploit the vulnerability, an attacker need administrator access on a local machine where PowerShell is running. The attacker could then connect to a PowerShell session and send commands to execute arbitrary code.
The update addresses the vulnerability by correcting how PowerShell commands are validated when WDAC protection is enabled.
",Microsoft,"Windows 10 Version 1803,Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1909,Windows Server, Version 1909 (server Core Installation),Windows 10 Version 1709 For 32-bit Systems,Windows 10 Version 1709,Windows 10 Version 1903 For 32-bit Systems,Windows 10 Version 1903 For X64-based Systems,Windows 10 Version 1903 For Arm64-based Systems,Windows Server, Version 1903 (server Core Installation),Windows 10 Version 2004,Windows Server Version 2004,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Powershell 7.0,Powershell 7.1",6.7,MEDIUM,0.00046999999904073775,false,false,false,false,,false,false,2020-09-11T17:08:33.000Z,0