cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-30045,https://securityvulnerability.io/vulnerability/CVE-2024-30045,Remote Code Execution Vulnerability Affects .NET and Visual Studio,.NET and Visual Studio Remote Code Execution Vulnerability,Microsoft,".net 8.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Powershell 7.4",6.3,MEDIUM,0.0005499999970197678,false,,false,false,false,,,false,false,,2024-05-14T16:57:29.676Z,0 CVE-2024-21409,https://securityvulnerability.io/vulnerability/CVE-2024-21409,Remote Code Execution Vulnerability Affects Microsoft Products,"A vulnerability has been identified in .NET, .NET Framework, and Visual Studio that allows for remote code execution. This flaw can enable an attacker to execute arbitrary code on the affected system, potentially leading to unauthorized access and control. The issue affects multiple versions of these platforms, requiring immediate attention from users to mitigate risks and safeguard sensitive data. Users are advised to apply the appropriate security updates as detailed in the vendor advisory.",Microsoft,"Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Powershell 7.3,Powershell 7.4,Powershell 7.2,.net 6.0,.net 7.0,.net 8.0,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2",7.3,HIGH,0.0005300000193528831,false,,false,false,false,,,false,false,,2024-04-09T17:00:08.248Z,0 CVE-2024-26190,https://securityvulnerability.io/vulnerability/CVE-2024-26190,Denial of Service Vulnerability in Microsoft QUIC Protocol,The Denial of Service vulnerability in Microsoft QUIC can allow an attacker to disrupt services by exploiting weaknesses in the protocol implementation. This vulnerability poses a risk to the availability of affected systems and may be leveraged in targeted attacks. Proper mitigation strategies should be employed to ensure network security and maintain service uptime. Organizations using Microsoft products that implement the QUIC protocol should closely monitor for updates and apply recommended security patches.,Microsoft,"Microsoft Visual Studio 2022 Version 17.9,Windows Server 2022,Windows 11 Version 21h2,Windows 11 Version 22h2,Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Powershell 7.3,Powershell 7.4,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,.net 7.0,.net 8.0",7.5,HIGH,0.0005200000014156103,false,,false,false,false,,,false,false,,2024-03-12T16:57:52.923Z,0 CVE-2024-21392,https://securityvulnerability.io/vulnerability/CVE-2024-21392,.NET and Visual Studio Denial of Service Vulnerability,"This vulnerability in Microsoft .NET and Visual Studio allows an attacker to execute a denial of service attack, potentially disrupting application functionality and affecting the availability of services. Proper security measures, including timely updates and monitoring, are essential to mitigate risks associated with this vulnerability.",Microsoft,"Microsoft Visual Studio 2022 Version 17.9,Powershell 7.3,Powershell 7.4,.net 7.0,.net 8.0,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.8",7.5,HIGH,0.0005300000193528831,false,,false,false,false,,,false,false,,2024-03-12T16:57:42.012Z,0 CVE-2024-0057,https://securityvulnerability.io/vulnerability/CVE-2024-0057,"NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability","A vulnerability exists in the .NET Framework and Visual Studio that allows an attacker to bypass security features. This can enable unauthorized access to system functions that would typically be restricted. The potential exploit could lead to increased risk for applications utilizing these frameworks if not addressed. Microsoft has highlighted this in its advisory, emphasizing the need for developers and IT administrators to apply patches and updates to safeguard their environments from potential exploitation.",Microsoft,".net 8.0,.net 7.0,.net 6.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Nuget 5.11.0,Nuget 17.4.0,Nuget 17.6.0,Nuget 17.8.0,Powershell 7.2,Powershell 7.3,Powershell 7.4,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2",9.1,CRITICAL,0.0014700000174343586,false,,true,false,true,2024-10-08T23:15:17.000Z,,false,false,,2024-01-09T18:15:00.000Z,0 CVE-2023-36435,https://securityvulnerability.io/vulnerability/CVE-2023-36435,Microsoft QUIC Denial of Service Vulnerability,"A vulnerability in Microsoft QUIC could allow an attacker to exploit the service, leading to a denial of service condition. This could disrupt network functions and affect system performance. It is crucial for users and administrators to apply the recommended updates and mitigations to safeguard against potential exploitation.",Microsoft,"Powershell 7.3,Windows Server 2022,Windows 11 Version 21h2,Windows 11 Version 22h2,.net 7.0",7.5,HIGH,0.0005099999834783375,false,,false,false,false,,,false,false,,2023-10-10T18:15:00.000Z,0 CVE-2023-38171,https://securityvulnerability.io/vulnerability/CVE-2023-38171,Microsoft QUIC Denial of Service Vulnerability,"The Microsoft QUIC protocol is susceptible to a vulnerability that allows attackers to trigger a Denial of Service (DoS) condition. This may result in system instability or unavailability, affecting user access and application performance. It is critical for users and administrators to mitigate potential risks by applying the recommended security updates outlined in Microsoft’s advisory.",Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.7,Windows Server 2022,Windows 11 Version 21h2,Windows 11 Version 22h2,.net 7.0,Powershell 7.3",7.5,HIGH,0.001879999996162951,false,,false,false,false,,,false,false,,2023-10-10T18:15:00.000Z,0 CVE-2023-36792,https://securityvulnerability.io/vulnerability/CVE-2023-36792,Visual Studio Remote Code Execution Vulnerability,A vulnerability in Microsoft Visual Studio allows remote attackers to execute arbitrary code on a system. This is achieved through specially crafted content processed by the application. Administrators and users are urged to apply the latest updates and patches provided by Microsoft to mitigate potential exploitation risks.,Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,.net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Microsoft Visual Studio 2022 Version 17.7,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.8,HIGH,0.0015999999595806003,false,,false,false,false,,,false,false,,2023-09-12T17:15:00.000Z,0 CVE-2023-36799,https://securityvulnerability.io/vulnerability/CVE-2023-36799,.NET Core and Visual Studio Denial of Service Vulnerability,.NET Core and Visual Studio Denial of Service Vulnerability,Microsoft,".net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.7,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Powershell 7.3",6.5,MEDIUM,0.0005099999834783375,false,,true,false,false,,,false,false,,2023-09-12T17:15:00.000Z,0 CVE-2023-36796,https://securityvulnerability.io/vulnerability/CVE-2023-36796,Visual Studio Remote Code Execution Vulnerability,"A vulnerability in Microsoft Visual Studio allows remote attackers to execute arbitrary code on the affected installations. This security flaw can be triggered when a user opens a malicious project file, resulting in malicious code execution within the Visual Studio environment. Users are urged to apply patches and updates from Microsoft to mitigate the risks associated with this vulnerability.",Microsoft,"Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.7,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2013 Update 5,Microsoft Visual Studio 2015 Update 3,.net 7.0,.net 6.0,Powershell 7.2,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.8,HIGH,0.0015999999595806003,false,,false,false,false,,,false,false,,2023-09-12T17:15:00.000Z,0 CVE-2023-36794,https://securityvulnerability.io/vulnerability/CVE-2023-36794,Visual Studio Remote Code Execution Vulnerability,"A vulnerability in Microsoft Visual Studio allows an attacker to execute remote code on the affected system. This could potentially lead to full system compromise. Users are strongly urged to apply recommended updates to safeguard against potential exploits. For detailed information and mitigation strategies, consult the official vendor advisory.",Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Powershell 7.2,.net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.7,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.8,HIGH,0.0015999999595806003,false,,false,false,false,,,false,false,,2023-09-12T17:15:00.000Z,0 CVE-2023-36793,https://securityvulnerability.io/vulnerability/CVE-2023-36793,Visual Studio Remote Code Execution Vulnerability,"A vulnerability in Microsoft Visual Studio allows attackers to execute arbitrary code on affected installations through crafted inputs. This security risk poses significant challenges, particularly in environments where Visual Studio is utilized for development. It is critical for developers and system administrators to implement available patches and updates to mitigate the risks associated with this vulnerability, ensuring the integrity and security of their development environments.",Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,.net 7.0,.net 6.0,Powershell 7.2,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.7,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.8,HIGH,0.0015999999595806003,false,,false,false,false,,,false,false,,2023-09-12T17:15:00.000Z,0 CVE-2023-33127,https://securityvulnerability.io/vulnerability/CVE-2023-33127,.NET and Visual Studio Elevation of Privilege Vulnerability,"This vulnerability in the .NET Framework and Visual Studio can allow an attacker to elevate their privileges, potentially gaining access to sensitive system resources. By exploiting this flaw, a malicious actor could execute arbitrary code with elevated permissions. Users and administrators are urged to apply patches and updates from Microsoft to mitigate the risk associated with this vulnerability.",Microsoft,".net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Powershell 7.3",8.1,HIGH,0.0006000000284984708,false,,false,false,false,,,false,false,,2023-07-11T18:15:00.000Z,0 CVE-2023-24897,https://securityvulnerability.io/vulnerability/CVE-2023-24897,".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability","A vulnerability exists in the .NET Framework and Visual Studio that could allow an attacker to execute arbitrary code on the target system. This flaw can be exploited if a user opens a specially crafted file that triggers the vulnerability. Successful exploitation may allow an attacker to install programs, view, change, or delete data, or create new accounts with full user rights. It is crucial for users to apply the latest updates provided by Microsoft to mitigate the risks associated with this vulnerability.",Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2013 Update 5,Microsoft Visual Studio 2015 Update 3,.net 7.0,.net 6.0,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2",7.8,HIGH,0.0017300000181421638,false,,true,false,false,,,false,false,,2023-06-14T15:15:00.000Z,0 CVE-2023-24936,https://securityvulnerability.io/vulnerability/CVE-2023-24936,".NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability","This vulnerability in the .NET Framework and Visual Studio enables unauthorized elevation of privileges, potentially allowing attackers to execute arbitrary code with higher permissions. It affects multiple versions of the .NET Framework and Visual Studio products, necessitating updates to mitigate potential security risks.",Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.4,.net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Powershell 7.3,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5.1,Microsoft .net Framework 3.5",7.5,HIGH,0.0006000000284984708,false,,false,false,false,,,false,false,,2023-06-14T15:15:00.000Z,0 CVE-2023-29331,https://securityvulnerability.io/vulnerability/CVE-2023-29331,".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability","A denial of service vulnerability exists in Microsoft .NET Framework and Visual Studio, which could allow an attacker to disrupt the availability of the affected applications. By exploiting this vulnerability, an attacker could send specially crafted requests that might lead to unexpected behavior, ultimately causing system downtime. It is crucial for users to implement the necessary updates to mitigate the risk and maintain seamless operation of their software.",Microsoft,".net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Powershell 7.3,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.5,HIGH,0.0006000000284984708,false,,false,false,false,,,false,false,,2023-06-14T15:15:00.000Z,0 CVE-2023-24895,https://securityvulnerability.io/vulnerability/CVE-2023-24895,".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability","This vulnerability affects the .NET Framework and Visual Studio, allowing attackers to execute arbitrary code on the host machine. Successful exploitation could lead to unauthorized access, data breaches, or further network compromise. Users are advised to apply the latest security updates provided by Microsoft to mitigate risks associated with this vulnerability.",Microsoft,".net 7.0,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Powershell 7.3,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.8,HIGH,0.0013099999632686377,false,,false,false,false,,,false,false,,2023-06-14T15:15:00.000Z,0 CVE-2023-33128,https://securityvulnerability.io/vulnerability/CVE-2023-33128,.NET and Visual Studio Remote Code Execution Vulnerability,"A vulnerability in .NET and Visual Studio enables remote code execution, potentially allowing an attacker to execute arbitrary code on a victim's machine. This could occur if a user opens a specifically crafted project file or accesses malicious content that triggers the execution of the compromised code, leading to serious security breaches. Mitigation steps include applying the latest security updates from Microsoft to protect against potential exploitation.",Microsoft,".net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.3",7.3,HIGH,0.0013099999632686377,false,,false,false,false,,,false,false,,2023-06-14T00:15:00.000Z,0 CVE-2023-32032,https://securityvulnerability.io/vulnerability/CVE-2023-32032,.NET and Visual Studio Elevation of Privilege Vulnerability,.NET and Visual Studio Elevation of Privilege Vulnerability,Microsoft,".net 7.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.3",6.5,MEDIUM,0.0006000000284984708,false,,false,false,false,,,false,false,,2023-06-14T00:15:00.000Z,0 CVE-2023-33126,https://securityvulnerability.io/vulnerability/CVE-2023-33126,.NET and Visual Studio Remote Code Execution Vulnerability,"This vulnerability in .NET and Visual Studio allows attackers to execute arbitrary code on affected systems. If exploited, it can compromise the security of applications and lead to unauthorized actions. Users are advised to update their versions promptly to mitigate any potential risks. Detailed information is available in the vendor advisory.",Microsoft,".net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2",7.3,HIGH,0.0013099999632686377,false,,false,false,false,,,false,false,,2023-06-14T00:15:00.000Z,0 CVE-2023-28260,https://securityvulnerability.io/vulnerability/CVE-2023-28260,.NET DLL Hijacking Remote Code Execution Vulnerability,"The .NET DLL Hijacking vulnerability allows attackers to exploit vulnerable applications by loading malicious DLL files. This can result in unauthorized remote code execution, compromising the integrity and security of affected systems. Software that improperly uses DLL dependencies may be vulnerable, leading to a potential breach of data and functions. It is critical for users and administrators to apply security patches and follow best practices to mitigate risks associated with this vulnerability.",Microsoft,".net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.5,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.0,Powershell 7.3,Powershell 7.2",7.8,HIGH,0.0026400000788271427,false,,false,false,false,,,false,false,,2023-04-11T21:15:00.000Z,0 CVE-2023-21808,https://securityvulnerability.io/vulnerability/CVE-2023-21808,.NET and Visual Studio Remote Code Execution Vulnerability,"This vulnerability in Microsoft .NET and Visual Studio allows an attacker to execute arbitrary code remotely. Users and developers may be exposed to risks through malicious input or compromised network environments, necessitating prompt attention to security updates and patches to mitigate potential exploits.",Microsoft,"Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2015 Update 3,Microsoft Visual Studio 2013 Update 5,.net 7.0,.net 6.0,Powershell 7.2,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2",7.8,HIGH,0.0028699999675154686,false,,false,false,false,,,false,false,,2023-02-14T21:15:00.000Z,0 CVE-2022-41089,https://securityvulnerability.io/vulnerability/CVE-2022-41089,.NET Framework Remote Code Execution Vulnerability,.NET Framework Remote Code Execution Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.4,.net 6.0,.net Core 3.1,.net 7.0,Powershell 7.2,Powershell 7.3,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6/4.6.2",7.8,HIGH,0.006029999814927578,false,,false,false,false,,,false,false,,2022-12-13T00:00:00.000Z,0 CVE-2022-34716,https://securityvulnerability.io/vulnerability/CVE-2022-34716,.NET Spoofing Vulnerability,.NET Spoofing Vulnerability,Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,.net 6.0,.net Core 3.1,Powershell 7.0,Powershell 7.2",5.9,MEDIUM,0.05527999997138977,false,,false,false,false,,,false,false,,2022-08-09T19:55:43.000Z,0 CVE-2022-23267,https://securityvulnerability.io/vulnerability/CVE-2022-23267,.NET and Visual Studio Denial of Service Vulnerability,.NET and Visual Studio Denial of Service Vulnerability,Microsoft,".net Core 3.1,.net 5.0,Microsoft Visual Studio 2019 Version 16.9 (includes 16.0 - 16.8),Visual Studio 2019 For Mac Version 8.10,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.0,.net 6.0,Microsoft Visual Studio 2022 Version 17.1,Powershell 7.0,Powershell 7.2,Visual Studio 2022 For Mac Version 17.0",7.5,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2022-05-10T20:33:32.000Z,0