Product:

Visual_studio_2022

(Microsoft)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 61
Date Id Summary Products Score Patch Annotated
2023-07-11 CVE-2023-33127 .NET and Visual Studio Elevation of Privilege Vulnerability \.net, Visual_studio_2022 8.1
2023-07-11 CVE-2023-33170 ASP.NET and Visual Studio Security Feature Bypass Vulnerability Fedora, \.net, Visual_studio_2022 8.1
2023-11-14 CVE-2023-36038 ASP.NET Core Denial of Service Vulnerability Asp\.net_core, Visual_studio_2022 7.5
2023-11-14 CVE-2023-36049 .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability \.net, \.net_framework, Visual_studio_2022 9.8
2023-11-14 CVE-2023-36558 ASP.NET Core - Security Feature Bypass Vulnerability \.net, Asp\.net_core, Visual_studio_2022 5.5
2023-11-14 CVE-2023-36042 Visual Studio Denial of Service Vulnerability Visual_studio_2019, Visual_studio_2022 5.5
2020-09-15 CVE-2020-8927 A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. Ubuntu_linux, Debian_linux, Fedora, Brotli, \.net, \.net_core, Powershell, Visual_studio_2019, Visual_studio_2022, Leap 6.5
2023-08-08 CVE-2023-35391 ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability \.net, Asp\.net_core, Visual_studio_2022 7.5
2023-10-10 CVE-2023-38171 Microsoft QUIC Denial of Service Vulnerability \.net, Visual_studio_2022, Windows_11_22h2, Windows_server_2022 7.5
2023-09-12 CVE-2023-36759 Visual Studio Elevation of Privilege Vulnerability Visual_studio_2019, Visual_studio_2022 6.7