cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-26190,https://securityvulnerability.io/vulnerability/CVE-2024-26190,Denial of Service Vulnerability in Microsoft QUIC Protocol,The Denial of Service vulnerability in Microsoft QUIC can allow an attacker to disrupt services by exploiting weaknesses in the protocol implementation. This vulnerability poses a risk to the availability of affected systems and may be leveraged in targeted attacks. Proper mitigation strategies should be employed to ensure network security and maintain service uptime. Organizations using Microsoft products that implement the QUIC protocol should closely monitor for updates and apply recommended security patches.,Microsoft,"Microsoft Visual Studio 2022 Version 17.9,Windows Server 2022,Windows 11 Version 21h2,Windows 11 Version 22h2,Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Powershell 7.3,Powershell 7.4,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,.net 7.0,.net 8.0",7.5,HIGH,0.0005200000014156103,false,false,false,false,,false,false,2024-03-12T16:57:52.923Z,0 CVE-2022-41089,https://securityvulnerability.io/vulnerability/CVE-2022-41089,.NET Framework Remote Code Execution Vulnerability,.NET Framework Remote Code Execution Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.4,.net 6.0,.net Core 3.1,.net 7.0,Powershell 7.2,Powershell 7.3,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6/4.6.2",7.8,HIGH,0.004780000075697899,false,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-41076,https://securityvulnerability.io/vulnerability/CVE-2022-41076,PowerShell Remote Code Execution Vulnerability,PowerShell Remote Code Execution Vulnerability,Microsoft,"Powershell 7.2,Powershell 7.3,Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.5,HIGH,0.008179999887943268,false,false,false,true,true,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-34716,https://securityvulnerability.io/vulnerability/CVE-2022-34716,.NET Spoofing Vulnerability,.NET Spoofing Vulnerability,Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,.net 6.0,.net Core 3.1,Powershell 7.0,Powershell 7.2",5.9,MEDIUM,0.05527999997138977,false,false,false,false,,false,false,2022-08-09T19:55:43.000Z,0 CVE-2022-23267,https://securityvulnerability.io/vulnerability/CVE-2022-23267,.NET and Visual Studio Denial of Service Vulnerability,.NET and Visual Studio Denial of Service Vulnerability,Microsoft,".net Core 3.1,.net 5.0,Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Visual Studio 2019 For Mac Version 8.10,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,.net 6.0,Microsoft Visual Studio 2022 Version 17.1,Powershell 7.0,Powershell 7.2,Visual Studio 2022 For Mac Version 17.0",7.5,HIGH,0.0006699999794363976,false,false,false,false,,false,false,2022-05-10T20:33:32.000Z,0 CVE-2022-26788,https://securityvulnerability.io/vulnerability/CVE-2022-26788,PowerShell Elevation of Privilege Vulnerability,PowerShell Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1909,Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 8.1,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation),Powershell 7.0,Powershell 7.1,Powershell 7.2",7.8,HIGH,0.0006699999794363976,false,false,false,false,,false,false,2022-04-15T19:04:25.000Z,0 CVE-2022-24512,https://securityvulnerability.io/vulnerability/CVE-2022-24512,.NET and Visual Studio Remote Code Execution Vulnerability,.NET and Visual Studio Remote Code Execution Vulnerability,Microsoft,"Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,.net 5.0,.net 6.0,.net Core 3.1,Powershell 7.2,Powershell 7.0,Powershell 7.1",6.3,MEDIUM,0.006479999981820583,false,false,false,false,,false,false,2022-03-09T17:08:15.000Z,0 CVE-2021-34485,https://securityvulnerability.io/vulnerability/CVE-2021-34485,.NET Core and Visual Studio Information Disclosure Vulnerability,.NET Core and Visual Studio Information Disclosure Vulnerability,Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Microsoft Visual Studio 2019 Version 16.10 (includes 16.0 - 16.9),Powershell 7.1,Powershell 7.0,.net Core 2.1,.net Core 3.1,.net 5.0",5,MEDIUM,0.0006099999882280827,false,false,false,false,,false,false,2021-08-12T18:11:57.000Z,0 CVE-2021-26423,https://securityvulnerability.io/vulnerability/CVE-2021-26423,.NET Core and Visual Studio Denial of Service Vulnerability,.NET Core and Visual Studio Denial of Service Vulnerability,Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Microsoft Visual Studio 2019 Version 16.10 (includes 16.0 - 16.9),Visual Studio 2019 For Mac Version 8.10,.net Core 2.1,.net Core 3.1,.net 5.0,Powershell Core 7.1,Powershell Core 7.0",7.5,HIGH,0.0024399999529123306,false,false,false,false,,false,false,2021-08-12T18:11:31.000Z,0 CVE-2021-26701,https://securityvulnerability.io/vulnerability/CVE-2021-26701,.NET Core Remote Code Execution Vulnerability,.NET Core Remote Code Execution Vulnerability,Microsoft,".net Core 2.1,.net Core 3.1,.net 5.0,Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Visual Studio 2019 For Mac,Microsoft Visual Studio 2019 Version 16.8 (includes 16.0 - 16.7),Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Powershell Core 7.1,Powershell Core 7.0",8.1,HIGH,0.131400004029274,false,false,false,false,,false,false,2021-02-25T23:02:00.000Z,0 CVE-2021-1721,https://securityvulnerability.io/vulnerability/CVE-2021-1721,.NET Core and Visual Studio Denial of Service Vulnerability,.NET Core and Visual Studio Denial of Service Vulnerability,Microsoft,"Microsoft Visual Studio 2019 Version 16.7 (includes 16.0 – 16.6),Powershell Core 7.1,Powershell Core 7.0,.net Core 2.1,.net Core 3.1,.net 5.0,Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2019 Version 16.8,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8)",6.5,MEDIUM,0.002580000087618828,false,false,false,false,,false,false,2021-02-25T23:01:26.000Z,0 CVE-2020-0951,https://securityvulnerability.io/vulnerability/CVE-2020-0951,Windows Defender Application Control Security Feature Bypass Vulnerability,"

A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement. An attacker who successfully exploited this vulnerability could execute PowerShell commands that would be blocked by WDAC.

To exploit the vulnerability, an attacker need administrator access on a local machine where PowerShell is running. The attacker could then connect to a PowerShell session and send commands to execute arbitrary code.

The update addresses the vulnerability by correcting how PowerShell commands are validated when WDAC protection is enabled.

",Microsoft,"Windows 10 Version 1803,Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1909,Windows Server, Version 1909 (server Core Installation),Windows 10 Version 1709 For 32-bit Systems,Windows 10 Version 1709,Windows 10 Version 1903 For 32-bit Systems,Windows 10 Version 1903 For X64-based Systems,Windows 10 Version 1903 For Arm64-based Systems,Windows Server, Version 1903 (server Core Installation),Windows 10 Version 2004,Windows Server Version 2004,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Powershell 7.0,Powershell 7.1",6.7,MEDIUM,0.00046999999904073775,false,false,false,false,,false,false,2020-09-11T17:08:33.000Z,0 CVE-2020-1108,https://securityvulnerability.io/vulnerability/CVE-2020-1108,,"A denial of service vulnerability exists when .NET Core or .NET Framework improperly handles web requests, aka '.NET Core & .NET Framework Denial of Service Vulnerability'.",Microsoft,".net Core,Microsoft Visual Studio 2017 Version 15.9 (includes 15.1 - 15.8),Microsoft Visual Studio 2019,Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2019 Version 16.5,.net Core 5.0,Powershell Core,Powershell 7.0,Microsoft .net Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2016,Microsoft .net Framework 4.8 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 4.8 On Windows 7 For 32-bit Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 7 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 8.1 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 8.1 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Rt 8.1,Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2012,Microsoft .net Framework 4.8 On Windows Server 2012 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2012 R2,Microsoft .net Framework 4.8 On Windows Server 2012 R2 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1909 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1909 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server, Version 1909 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For Arm64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows Server 2016,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.1/4.7.2 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.1/4.7.2 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 4.6,Microsoft .net Framework 2.0,Microsoft .net Framework 3.0,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1,Microsoft .net Framework 4.5.2,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For Arm64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1909 For Arm64-based Systems,Microsoft .net Framework 3.5 And 4.7.1/4.7.2 On Windows 10 Version 1709 For Arm64-based Systems,Microsoft .net Framework 3.5 And 4.6/4.6.1/4.6.2 On Windows 10 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.6/4.6.1/4.6.2 On Windows 10 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1803 For Arm64-based Systems",7.5,HIGH,0.0016499999910593033,false,false,false,false,,false,false,2020-05-21T23:15:00.000Z,0 CVE-2019-1167,https://securityvulnerability.io/vulnerability/CVE-2019-1167,,"A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement, aka 'Windows Defender Application Control Security Feature Bypass Vulnerability'.",Microsoft,Powershell Core,4.1,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2019-07-19T14:34:19.000Z,0 CVE-2019-0627,https://securityvulnerability.io/vulnerability/CVE-2019-0627,,"A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard, aka 'Windows Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0631, CVE-2019-0632.",Microsoft,"Windows,Windows Server,Powershell Core",7.8,HIGH,0.0013000000035390258,false,false,false,false,,false,false,2019-03-05T23:29:00.000Z,0 CVE-2019-0657,https://securityvulnerability.io/vulnerability/CVE-2019-0657,,"A vulnerability exists in certain .Net Framework API's and Visual Studio in the way they parse URL's, aka '.NET Framework and Visual Studio Spoofing Vulnerability'.",Microsoft,"Microsoft .net Framework 4.5.2,Microsoft .net Framework 4.6,.net Core,Microsoft Visual Studio,Microsoft .net Framework 4.7.2,Microsoft .net Framework 4.6/4.6.1/4.6.2,Microsoft .net Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.7/4.7.1/4.7.2,Microsoft .net Framework 4.7.1/4.7.2,Powershell Core,Microsoft Visual Studio 2017,Microsoft .net Framework 3.5,Microsoft .net Framework 3.0,Microsoft .net Framework 2.0,Microsoft .net Framework 3.5.1",5.9,MEDIUM,0.014259999617934227,false,false,false,false,,false,false,2019-03-05T23:29:00.000Z,0 CVE-2019-0632,https://securityvulnerability.io/vulnerability/CVE-2019-0632,,"A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard, aka 'Windows Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0627, CVE-2019-0631.",Microsoft,"Windows,Windows Server,Powershell Core",7.8,HIGH,0.0013000000035390258,false,false,false,false,,false,false,2019-03-05T23:29:00.000Z,0 CVE-2019-0631,https://securityvulnerability.io/vulnerability/CVE-2019-0631,,"A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard, aka 'Windows Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0627, CVE-2019-0632.",Microsoft,"Windows,Windows Server,Powershell Core",7.8,HIGH,0.0013000000035390258,false,false,false,false,,false,false,2019-03-05T23:29:00.000Z,0 CVE-2018-8256,https://securityvulnerability.io/vulnerability/CVE-2018-8256,,"A remote code execution vulnerability exists when PowerShell improperly handles specially crafted files, aka ""Microsoft PowerShell Remote Code Execution Vulnerability."" This affects Windows RT 8.1, PowerShell Core 6.0, Microsoft.PowerShell.Archive 1.2.2.0, Windows Server 2016, Windows Server 2012, Windows Server 2008 R2, Windows Server 2019, Windows 7, Windows Server 2012 R2, PowerShell Core 6.1, Windows 10 Servers, Windows 10, Windows 8.1.",Microsoft,"Windows 7,Microsoft.powershell.archive,Windows 10 Servers,Windows Server 2012 R2,Windows Rt 8.1,Windows Server 2008 R2,Windows Server 2012,Powershell Core,Windows Server 2016,Windows 8.1,Windows 10,Windows Server 2019",8.8,HIGH,0.6891899704933167,false,false,false,false,,false,false,2018-11-14T01:00:00.000Z,0 CVE-2018-8415,https://securityvulnerability.io/vulnerability/CVE-2018-8415,,"A tampering vulnerability exists in PowerShell that could allow an attacker to execute unlogged code, aka ""Microsoft PowerShell Tampering Vulnerability."" This affects Windows 7, PowerShell Core 6.1, Windows Server 2012 R2, Windows RT 8.1, PowerShell Core 6.0, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.",Microsoft,"Windows 7,Windows Server 2012 R2,Windows Rt 8.1,Windows Server 2012,Windows Server 2019,Windows 8.1,Powershell Core,Windows Server 2016,Windows Server 2008 R2,Windows 10,Windows 10 Servers",7.8,HIGH,0.009239999577403069,false,false,false,false,,false,false,2018-11-14T01:00:00.000Z,0 CVE-2018-8292,https://securityvulnerability.io/vulnerability/CVE-2018-8292,,"An information disclosure vulnerability exists in .NET Core when authentication information is inadvertently exposed in a redirect, aka "".NET Core Information Disclosure Vulnerability."" This affects .NET Core 2.1, .NET Core 1.0, .NET Core 1.1, PowerShell Core 6.0.",Microsoft,"Powershell Core,.net Core",7.5,HIGH,0.017349999397993088,false,false,false,false,,false,false,2018-10-10T13:00:00.000Z,0 CVE-2018-0786,https://securityvulnerability.io/vulnerability/CVE-2018-0786,,"Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, .NET Core 1.0 and 2.0, and PowerShell Core 6.0.0 allow a security feature bypass vulnerability due to the way certificates are validated, aka "".NET Security Feature Bypass Vulnerability.""",Microsoft,".net Framework, .net Core, And Powershell Core",7.5,HIGH,0.007829999551177025,false,false,false,false,,false,false,2018-01-10T01:29:00.000Z,0