cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-21409,https://securityvulnerability.io/vulnerability/CVE-2024-21409,Remote Code Execution Vulnerability Affects Microsoft Products,"A vulnerability has been identified in .NET, .NET Framework, and Visual Studio that allows for remote code execution. This flaw can enable an attacker to execute arbitrary code on the affected system, potentially leading to unauthorized access and control. The issue affects multiple versions of these platforms, requiring immediate attention from users to mitigate risks and safeguard sensitive data. Users are advised to apply the appropriate security updates as detailed in the vendor advisory.",Microsoft,"Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Powershell 7.3,Powershell 7.4,Powershell 7.2,.net 6.0,.net 7.0,.net 8.0,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2",7.3,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-09T17:00:08.248Z,0 CVE-2024-26190,https://securityvulnerability.io/vulnerability/CVE-2024-26190,Denial of Service Vulnerability in Microsoft QUIC Protocol,The Denial of Service vulnerability in Microsoft QUIC can allow an attacker to disrupt services by exploiting weaknesses in the protocol implementation. This vulnerability poses a risk to the availability of affected systems and may be leveraged in targeted attacks. Proper mitigation strategies should be employed to ensure network security and maintain service uptime. Organizations using Microsoft products that implement the QUIC protocol should closely monitor for updates and apply recommended security patches.,Microsoft,"Microsoft Visual Studio 2022 Version 17.9,Windows Server 2022,Windows 11 Version 21h2,Windows 11 Version 22h2,Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Powershell 7.3,Powershell 7.4,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,.net 7.0,.net 8.0",7.5,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-03-12T16:57:52.923Z,0 CVE-2024-21392,https://securityvulnerability.io/vulnerability/CVE-2024-21392,.NET and Visual Studio Denial of Service Vulnerability,"This vulnerability in Microsoft .NET and Visual Studio allows an attacker to execute a denial of service attack, potentially disrupting application functionality and affecting the availability of services. Proper security measures, including timely updates and monitoring, are essential to mitigate risks associated with this vulnerability.",Microsoft,"Microsoft Visual Studio 2022 Version 17.9,Powershell 7.3,Powershell 7.4,.net 7.0,.net 8.0,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.8",7.5,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-03-12T16:57:42.012Z,0 CVE-2024-0057,https://securityvulnerability.io/vulnerability/CVE-2024-0057,"NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability","A vulnerability exists in the .NET Framework and Visual Studio that allows an attacker to bypass security features. This can enable unauthorized access to system functions that would typically be restricted. The potential exploit could lead to increased risk for applications utilizing these frameworks if not addressed. Microsoft has highlighted this in its advisory, emphasizing the need for developers and IT administrators to apply patches and updates to safeguard their environments from potential exploitation.",Microsoft,".net 8.0,.net 7.0,.net 6.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Nuget 5.11.0,Nuget 17.4.0,Nuget 17.6.0,Nuget 17.8.0,Powershell 7.2,Powershell 7.3,Powershell 7.4,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2",9.1,CRITICAL,0.0012100000167265534,false,true,false,true,,false,false,2024-01-09T18:15:00.000Z,0 CVE-2023-36013,https://securityvulnerability.io/vulnerability/CVE-2023-36013,PowerShell Information Disclosure Vulnerability,PowerShell Information Disclosure Vulnerability,Microsoft,"Powershell 7.2,Powershell 7.3,Powershell 7.4",6.5,MEDIUM,0.0014299999456852674,false,true,false,false,,false,false,2023-11-20T16:15:00.000Z,0 CVE-2023-38171,https://securityvulnerability.io/vulnerability/CVE-2023-38171,Microsoft QUIC Denial of Service Vulnerability,Microsoft QUIC Denial of Service Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.7,Windows Server 2022,Windows 11 Version 21h2,Windows 11 Version 22h2,.net 7.0,Powershell 7.3",7.5,HIGH,0.0017500000540167093,false,false,false,false,,false,false,2023-10-10T18:15:00.000Z,0 CVE-2023-36435,https://securityvulnerability.io/vulnerability/CVE-2023-36435,Microsoft QUIC Denial of Service Vulnerability,Microsoft QUIC Denial of Service Vulnerability,Microsoft,"Powershell 7.3,Windows Server 2022,Windows 11 Version 21h2,Windows 11 Version 22h2,.net 7.0",7.5,HIGH,0.00046999999904073775,false,false,false,false,,false,false,2023-10-10T18:15:00.000Z,0 CVE-2023-36799,https://securityvulnerability.io/vulnerability/CVE-2023-36799,.NET Core and Visual Studio Denial of Service Vulnerability,.NET Core and Visual Studio Denial of Service Vulnerability,Microsoft,".net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.7,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Powershell 7.3",6.5,MEDIUM,0.0005099999834783375,false,true,false,false,,false,false,2023-09-12T17:15:00.000Z,0 CVE-2023-33127,https://securityvulnerability.io/vulnerability/CVE-2023-33127,.NET and Visual Studio Elevation of Privilege Vulnerability,.NET and Visual Studio Elevation of Privilege Vulnerability,Microsoft,".net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Powershell 7.3",8.1,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2023-07-11T18:15:00.000Z,0 CVE-2023-24936,https://securityvulnerability.io/vulnerability/CVE-2023-24936,".NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability","This vulnerability in the .NET Framework and Visual Studio enables unauthorized elevation of privileges, potentially allowing attackers to execute arbitrary code with higher permissions. It affects multiple versions of the .NET Framework and Visual Studio products, necessitating updates to mitigate potential security risks.",Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.4,.net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Powershell 7.3,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5.1,Microsoft .net Framework 3.5",7.5,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-06-14T15:15:00.000Z,0 CVE-2023-24895,https://securityvulnerability.io/vulnerability/CVE-2023-24895,".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability","This vulnerability affects the .NET Framework and Visual Studio, allowing attackers to execute arbitrary code on the host machine. Successful exploitation could lead to unauthorized access, data breaches, or further network compromise. Users are advised to apply the latest security updates provided by Microsoft to mitigate risks associated with this vulnerability.",Microsoft,".net 7.0,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Powershell 7.3,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.8,HIGH,0.0013099999632686377,false,false,false,false,,false,false,2023-06-14T15:15:00.000Z,0 CVE-2023-29331,https://securityvulnerability.io/vulnerability/CVE-2023-29331,".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability",".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability",Microsoft,".net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Powershell 7.3,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.5,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-06-14T15:15:00.000Z,0 CVE-2023-33128,https://securityvulnerability.io/vulnerability/CVE-2023-33128,.NET and Visual Studio Remote Code Execution Vulnerability,.NET and Visual Studio Remote Code Execution Vulnerability,Microsoft,".net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.3",7.3,HIGH,0.0013099999632686377,false,false,false,false,,false,false,2023-06-14T00:15:00.000Z,0 CVE-2023-32032,https://securityvulnerability.io/vulnerability/CVE-2023-32032,.NET and Visual Studio Elevation of Privilege Vulnerability,.NET and Visual Studio Elevation of Privilege Vulnerability,Microsoft,".net 7.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.3",6.5,MEDIUM,0.0006000000284984708,false,false,false,false,,false,false,2023-06-14T00:15:00.000Z,0 CVE-2023-28260,https://securityvulnerability.io/vulnerability/CVE-2023-28260,.NET DLL Hijacking Remote Code Execution Vulnerability,.NET DLL Hijacking Remote Code Execution Vulnerability,Microsoft,".net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.5,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.0,Powershell 7.3,Powershell 7.2",7.8,HIGH,0.002420000033453107,false,false,false,false,,false,false,2023-04-11T21:15:00.000Z,0 CVE-2022-41076,https://securityvulnerability.io/vulnerability/CVE-2022-41076,PowerShell Remote Code Execution Vulnerability,PowerShell Remote Code Execution Vulnerability,Microsoft,"Powershell 7.2,Powershell 7.3,Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.5,HIGH,0.008179999887943268,false,false,false,true,true,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-41089,https://securityvulnerability.io/vulnerability/CVE-2022-41089,.NET Framework Remote Code Execution Vulnerability,.NET Framework Remote Code Execution Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.4,.net 6.0,.net Core 3.1,.net 7.0,Powershell 7.2,Powershell 7.3,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6/4.6.2",7.8,HIGH,0.004780000075697899,false,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0