Product:

Visual_studio_2022

(Microsoft)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 101
Date Id Summary Products Score Patch Annotated
2022-05-10 CVE-2022-29145 .NET and Visual Studio Denial of Service Vulnerability Fedora, \.net, \.net_core, Visual_studio_2019, Visual_studio_2022 N/A
2022-09-13 CVE-2022-38013 .NET Core and Visual Studio Denial of Service Vulnerability Fedora, \.net, \.net_core, Visual_studio_2019, Visual_studio_2022 N/A
2023-07-11 CVE-2023-33170 ASP.NET and Visual Studio Security Feature Bypass Vulnerability Fedora, \.net, Visual_studio_2022 N/A
2023-08-08 CVE-2023-35390 .NET and Visual Studio Remote Code Execution Vulnerability \.net, Visual_studio_2022 N/A
2023-11-14 CVE-2023-36558 ASP.NET Core Security Feature Bypass Vulnerability \.net, Asp\.net_core, Visual_studio_2022 5.5
2024-03-12 CVE-2024-26190 Microsoft QUIC Denial of Service Vulnerability \.net, Powershell, Visual_studio_2022, Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_server_2022, Windows_server_2022_23h2 N/A
2024-03-12 CVE-2024-21392 .NET and Visual Studio Denial of Service Vulnerability \.net, Powershell, Visual_studio_2022 N/A
2020-09-15 CVE-2020-8927 A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. Ubuntu_linux, Debian_linux, Fedora, Brotli, \.net, \.net_core, Powershell, Visual_studio_2019, Visual_studio_2022, Leap 6.5
2021-12-15 CVE-2021-43877 ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability Asp\.net_core, Visual_studio_2019, Visual_studio_2022 N/A
2022-02-09 CVE-2022-21986 .NET Denial of Service Vulnerability Fedora, \.net, Visual_studio_2019, Visual_studio_2022 N/A