cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-21319,https://securityvulnerability.io/vulnerability/CVE-2024-21319,Microsoft Identity Denial of service vulnerability,"A denial of service vulnerability exists within Microsoft Identity, which could allow an attacker to impair the functions of the affected services. This vulnerability may lead to disruption in user authentication and application access, resulting in negative impacts on operations relying on these critical identity services. Organizations utilizing Microsoft Identity platforms must take necessary precautions to mitigate any potential exploitation of this vulnerability, ensuring the security and continuity of their operations.",Microsoft,".net 6.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.8,.net 7.0,.net 8.0,Microsoft Identity Model V6.0.0 Fornuget,Microsoft Identity Model V7.0.0 For Nuget,Microsoft Identity Model V6.0.0,Microsoft Identity Model V5.0.0,Microsoft Identity Model V7.0.0,Microsoft Identity Model V5.0.0 For Nuget",6.8,MEDIUM,0.0005300000193528831,false,,false,false,false,,,false,false,,2024-01-09T18:59:01.270Z,0 CVE-2024-20656,https://securityvulnerability.io/vulnerability/CVE-2024-20656,Elevation of Privilege Vulnerability Affects Visual Studio,"An elevation of privilege vulnerability exists in Visual Studio, which could allow an attacker to execute arbitrary code with elevated permissions. By exploiting this vulnerability, attackers can gain unauthorized access to sensitive information and impact system integrity. It's essential for organizations using affected versions to apply appropriate security updates promptly to mitigate potential risks and enhance the overall security posture.",Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2015 Update 3",7.8,HIGH,0.0005300000193528831,false,,true,false,true,2024-01-12T15:08:01.000Z,true,true,false,,2024-01-09T18:15:00.000Z,473 CVE-2024-0056,https://securityvulnerability.io/vulnerability/CVE-2024-0056,Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability,"A security feature bypass vulnerability exists in Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Providers. This vulnerability allows an attacker to bypass security measures intended to restrict user access and control over SQL database activities. Successful exploitation could lead to unauthorized data access or manipulation, posing significant risks to the integrity and confidentiality of sensitive information. Organizations utilizing these data providers must assess their environment to apply necessary mitigations and protect their database systems.",Microsoft,"Microsoft Sql Server 2022 (gdr),.net 6.0,.net 7.0,.net 8.0,Microsoft.data.sqlclient,System.data.sqlclient,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Sql Server 2022 (cu 10),Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 2.0 Service Pack 2",8.7,HIGH,0.0005300000193528831,false,,true,false,false,,,false,false,,2024-01-09T18:15:00.000Z,0 CVE-2024-0057,https://securityvulnerability.io/vulnerability/CVE-2024-0057,"NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability","A vulnerability exists in the .NET Framework and Visual Studio that allows an attacker to bypass security features. This can enable unauthorized access to system functions that would typically be restricted. The potential exploit could lead to increased risk for applications utilizing these frameworks if not addressed. Microsoft has highlighted this in its advisory, emphasizing the need for developers and IT administrators to apply patches and updates to safeguard their environments from potential exploitation.",Microsoft,".net 8.0,.net 7.0,.net 6.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Nuget 5.11.0,Nuget 17.4.0,Nuget 17.6.0,Nuget 17.8.0,Powershell 7.2,Powershell 7.3,Powershell 7.4,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2",9.1,CRITICAL,0.0014700000174343586,false,,true,false,true,2024-10-08T23:15:17.000Z,,false,false,,2024-01-09T18:15:00.000Z,0 CVE-2023-36038,https://securityvulnerability.io/vulnerability/CVE-2023-36038,ASP.NET Core Denial of Service Vulnerability,"This vulnerability in ASP.NET Core allows an attacker to exploit specific functionalities, potentially leading to a denial of service. By crafting specially designed requests, an adversary can overwhelm server resources and disrupt service availability. It is crucial for organizations using affected versions of ASP.NET Core to implement the latest security updates provided by Microsoft to mitigate this risk.",Microsoft,"Asp.net Core 8.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.7,.net 8.0",8.2,HIGH,0.0012600000482052565,false,,false,false,false,,,false,false,,2023-11-14T22:15:00.000Z,0 CVE-2023-36558,https://securityvulnerability.io/vulnerability/CVE-2023-36558,ASP.NET Core - Security Feature Bypass Vulnerability,ASP.NET Core Security Feature Bypass Vulnerability,Microsoft,".net 6.0,Asp.net Core 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.2,.net 8.0,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.7,Asp.net Core 7.0,Asp.net Core 8.0",5.5,MEDIUM,0.0004299999854993075,false,,true,false,false,,,false,false,,2023-11-14T22:15:00.000Z,0 CVE-2023-36049,https://securityvulnerability.io/vulnerability/CVE-2023-36049,Elevation of Privilege Vulnerability Affects Microsoft Products,"A vulnerability with high CVSS scores has been identified in the .NET Framework, allowing for the elevation of privilege and security feature bypass. This vulnerability specifically affects FTP operations and allows unauthorized users to write or delete files on the server, potentially leading to data loss, data corruption, or unauthorized access to sensitive information. Microsoft has released patches to address the flaws, and users are urged to apply the updates promptly in order to safeguard against potential attacks. The exploitation of these vulnerabilities could have a significant impact on affected systems, especially those relying on the .NET Framework for FTP operations.",Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.7,Microsoft Visual Studio 2022 Version 17.6,.net 8.0,.net 6.0,.net 7.0,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6/4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.6,HIGH,0.002139999996870756,false,,true,true,true,2024-03-07T09:40:33.000Z,,false,false,,2023-11-14T21:15:00.000Z,0 CVE-2023-38171,https://securityvulnerability.io/vulnerability/CVE-2023-38171,Microsoft QUIC Denial of Service Vulnerability,"The Microsoft QUIC protocol is susceptible to a vulnerability that allows attackers to trigger a Denial of Service (DoS) condition. This may result in system instability or unavailability, affecting user access and application performance. It is critical for users and administrators to mitigate potential risks by applying the recommended security updates outlined in Microsoft’s advisory.",Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.7,Windows Server 2022,Windows 11 Version 21h2,Windows 11 Version 22h2,.net 7.0,Powershell 7.3",7.5,HIGH,0.001879999996162951,false,,false,false,false,,,false,false,,2023-10-10T18:15:00.000Z,0 CVE-2023-36796,https://securityvulnerability.io/vulnerability/CVE-2023-36796,Visual Studio Remote Code Execution Vulnerability,"A vulnerability in Microsoft Visual Studio allows remote attackers to execute arbitrary code on the affected installations. This security flaw can be triggered when a user opens a malicious project file, resulting in malicious code execution within the Visual Studio environment. Users are urged to apply patches and updates from Microsoft to mitigate the risks associated with this vulnerability.",Microsoft,"Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.7,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2013 Update 5,Microsoft Visual Studio 2015 Update 3,.net 7.0,.net 6.0,Powershell 7.2,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.8,HIGH,0.0015999999595806003,false,,false,false,false,,,false,false,,2023-09-12T17:15:00.000Z,0 CVE-2023-36793,https://securityvulnerability.io/vulnerability/CVE-2023-36793,Visual Studio Remote Code Execution Vulnerability,"A vulnerability in Microsoft Visual Studio allows attackers to execute arbitrary code on affected installations through crafted inputs. This security risk poses significant challenges, particularly in environments where Visual Studio is utilized for development. It is critical for developers and system administrators to implement available patches and updates to mitigate the risks associated with this vulnerability, ensuring the integrity and security of their development environments.",Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,.net 7.0,.net 6.0,Powershell 7.2,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.7,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.8,HIGH,0.0015999999595806003,false,,false,false,false,,,false,false,,2023-09-12T17:15:00.000Z,0 CVE-2023-36792,https://securityvulnerability.io/vulnerability/CVE-2023-36792,Visual Studio Remote Code Execution Vulnerability,A vulnerability in Microsoft Visual Studio allows remote attackers to execute arbitrary code on a system. This is achieved through specially crafted content processed by the application. Administrators and users are urged to apply the latest updates and patches provided by Microsoft to mitigate potential exploitation risks.,Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,.net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Microsoft Visual Studio 2022 Version 17.7,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.8,HIGH,0.0015999999595806003,false,,false,false,false,,,false,false,,2023-09-12T17:15:00.000Z,0 CVE-2023-36794,https://securityvulnerability.io/vulnerability/CVE-2023-36794,Visual Studio Remote Code Execution Vulnerability,"A vulnerability in Microsoft Visual Studio allows an attacker to execute remote code on the affected system. This could potentially lead to full system compromise. Users are strongly urged to apply recommended updates to safeguard against potential exploits. For detailed information and mitigation strategies, consult the official vendor advisory.",Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Powershell 7.2,.net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.7,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.8,HIGH,0.0015999999595806003,false,,false,false,false,,,false,false,,2023-09-12T17:15:00.000Z,0 CVE-2023-36759,https://securityvulnerability.io/vulnerability/CVE-2023-36759,Visual Studio Elevation of Privilege Vulnerability,Visual Studio Elevation of Privilege Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.7,Microsoft Visual Studio 2022 Version 17.6",6.7,MEDIUM,0.00046999999904073775,false,,false,false,false,,,false,false,,2023-09-12T17:15:00.000Z,0 CVE-2023-36799,https://securityvulnerability.io/vulnerability/CVE-2023-36799,.NET Core and Visual Studio Denial of Service Vulnerability,.NET Core and Visual Studio Denial of Service Vulnerability,Microsoft,".net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.7,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Powershell 7.3",6.5,MEDIUM,0.0005099999834783375,false,,true,false,false,,,false,false,,2023-09-12T17:15:00.000Z,0 CVE-2023-38180,https://securityvulnerability.io/vulnerability/CVE-2023-38180,.NET and Visual Studio Denial of Service Vulnerability,"A security weakness in .NET and Visual Studio that allows attackers to exploit the system, potentially leading to denial of service conditions. This vulnerability may allow an attacker to create a denial of service situation, interrupting services reliant on these platforms. Users are encouraged to review the vendor advisory for mitigation strategies.",Microsoft,"Asp.net Core 2.1,.net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6",7.5,HIGH,0.006639999803155661,true,2023-08-09T00:00:00.000Z,false,false,true,2023-08-09T00:00:00.000Z,,false,false,,2023-08-08T19:15:00.000Z,0 CVE-2023-35391,https://securityvulnerability.io/vulnerability/CVE-2023-35391,ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability,ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Asp.net Core 2.1,.net 6.0,.net 7.0",6.2,MEDIUM,0.0036800000816583633,false,,false,false,false,,,false,false,,2023-08-08T19:15:00.000Z,0 CVE-2023-35390,https://securityvulnerability.io/vulnerability/CVE-2023-35390,.NET and Visual Studio Remote Code Execution Vulnerability,"This vulnerability allows attackers to execute arbitrary code on a victim's machine through malicious input, potentially leading to full system compromise. It specifically impacts Microsoft products, including versions of the .NET Framework and Visual Studio, necessitating immediate attention to mitigate risks.",Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,.net 6.0,.net 7.0",7.8,HIGH,0.0020000000949949026,false,,false,false,false,,,false,false,,2023-08-08T18:15:00.000Z,0 CVE-2023-36897,https://securityvulnerability.io/vulnerability/CVE-2023-36897,Visual Studio Tools for Office Runtime Spoofing Vulnerability,"The spoofing vulnerability in Visual Studio Tools for Office Runtime allows attackers to manipulate user input, potentially leading to unauthorized actions or exposure of sensitive information. This vulnerability highlights the importance of securing development tools and ensuring that users are aware of the risks associated with untrusted content.",Microsoft,"Microsoft Office 2019,Microsoft 365 Apps For Enterprise,Microsoft Office Ltsc 2021,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Visual Studio 2010 Tools For Office Runtime",8.1,HIGH,0.0009899999713525176,false,,false,false,false,,,false,false,,2023-08-08T18:15:00.000Z,0 CVE-2023-38178,https://securityvulnerability.io/vulnerability/CVE-2023-38178,.NET Core and Visual Studio Denial of Service Vulnerability,"A vulnerability in .NET Core and Visual Studio could allow an attacker to exploit certain functionalities, leading to a Denial of Service condition. This issue arises from inadequate handling of specific requests, which could cause an application to become unresponsive. It is essential for developers using these platforms to stay informed about this vulnerability to implement measures that mitigate potential risks.",Microsoft,".net 6.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4",7.5,HIGH,0.0004900000058114529,false,,false,false,false,,,false,false,,2023-08-08T18:15:00.000Z,0 CVE-2023-33170,https://securityvulnerability.io/vulnerability/CVE-2023-33170,ASP.NET and Visual Studio Security Feature Bypass Vulnerability,"This vulnerability in ASP.NET and Visual Studio allows attackers to bypass security features, potentially exposing applications to unauthorized access and exploitation. Threat actors could leverage this weakness to manipulate application behavior or access sensitive information, underscoring the importance of timely updates and security measures.",Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,.net 6.0,.net 7.0",8.1,HIGH,0.0006000000284984708,false,,false,false,false,,,false,false,,2023-07-11T18:15:00.000Z,0 CVE-2023-33127,https://securityvulnerability.io/vulnerability/CVE-2023-33127,.NET and Visual Studio Elevation of Privilege Vulnerability,"This vulnerability in the .NET Framework and Visual Studio can allow an attacker to elevate their privileges, potentially gaining access to sensitive system resources. By exploiting this flaw, a malicious actor could execute arbitrary code with elevated permissions. Users and administrators are urged to apply patches and updates from Microsoft to mitigate the risk associated with this vulnerability.",Microsoft,".net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Powershell 7.3",8.1,HIGH,0.0006000000284984708,false,,false,false,false,,,false,false,,2023-07-11T18:15:00.000Z,0 CVE-2023-32025,https://securityvulnerability.io/vulnerability/CVE-2023-32025,Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability,"The Microsoft ODBC Driver for SQL Server is impacted by a vulnerability that allows for remote code execution. If exploited, an attacker could execute arbitrary code on the system, potentially leading to unauthorized access and data breaches. It is crucial for users and administrators to apply the latest security updates to safeguard against this risk.",Microsoft,"Microsoft Odbc Driver 17 For Sql Server On Linux,Microsoft Odbc Driver 18 For Sql Server On Mac OS,Microsoft Odbc Driver 17 For Sql Server On Mac OS,Microsoft Odbc Driver 18 For Sql Server On Windows,Microsoft Odbc Driver 18 For Sql Server On Linux,Microsoft Odbc Driver 17 For Sql Server On Windows,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8",7.8,HIGH,0.0013099999632686377,false,,false,false,false,,,false,false,,2023-06-16T01:15:00.000Z,0 CVE-2023-29356,https://securityvulnerability.io/vulnerability/CVE-2023-29356,Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability,"A vulnerability exists in Microsoft ODBC Driver for SQL Server that could allow an attacker to execute arbitrary code on an affected system. By leveraging this vulnerability, an attacker could potentially gain elevated privileges, leading to unauthorized access and control over sensitive data and system resources. It is essential for users to apply the latest updates and patches to mitigate the risks associated with this vulnerability.",Microsoft,"Microsoft Odbc Driver 17 For Sql Server On Linux,Microsoft Odbc Driver 18 For Sql Server On Linux,Microsoft Odbc Driver 17 For Sql Server On Windows,Microsoft Odbc Driver 18 For Sql Server On Windows,Microsoft Odbc Driver 17 For Sql Server On Mac OS,Microsoft Odbc Driver 18 For Sql Server On Mac OS,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10)",7.8,HIGH,0.0013099999632686377,false,,false,false,false,,,false,false,,2023-06-16T01:15:00.000Z,0 CVE-2023-29349,https://securityvulnerability.io/vulnerability/CVE-2023-29349,Microsoft ODBC and OLE DB Remote Code Execution Vulnerability,"A vulnerability exists in Microsoft ODBC and OLE DB that could allow an attacker to execute arbitrary code on the affected system. This flaw can be exploited through specially crafted input, which compromises the integrity and confidentiality of the data. It is crucial for users to apply the security updates provided by Microsoft to mitigate the risks associated with this vulnerability.",Microsoft,"Microsoft Ole Db Driver 18 For Sql Server,Microsoft Ole Db Driver 19 For Sql Server,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Odbc Driver 18 For Sql Server On Mac OS,Microsoft Odbc Driver 18 For Sql Server On Linux,Microsoft Odbc Driver 17 For Sql Server On Mac OS,Microsoft Odbc Driver 17 For Sql Server On Linux,Microsoft Odbc Driver 18 For Sql Server On Windows,Microsoft Odbc Driver 17 For Sql Server On Windows",7.8,HIGH,0.0013099999632686377,false,,false,false,false,,,false,false,,2023-06-16T01:15:00.000Z,0 CVE-2023-32028,https://securityvulnerability.io/vulnerability/CVE-2023-32028,Microsoft SQL OLE DB Remote Code Execution Vulnerability,"A vulnerability has been identified in the Microsoft SQL OLE DB that allows for remote code execution. This issue can enable an attacker to gain unauthorized access and potentially execute arbitrary code on the affected system. It is crucial for organizations to apply security updates and follow best practices to mitigate the risks associated with this vulnerability. For more details, consult the official Microsoft advisory.",Microsoft,"Microsoft Ole Db Driver 19 For Sql Server,Microsoft Ole Db Driver 18 For Sql Server,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8",7.8,HIGH,0.0013099999632686377,false,,false,false,false,,,false,false,,2023-06-16T01:15:00.000Z,0