Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Filtered by product Visual Studio 2022
Total 69 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-24767 2 Git For Windows Project, Microsoft 4 Git For Windows, Visual Studio 2017, Visual Studio 2019 and 1 more 2024-02-28 6.9 MEDIUM 7.8 HIGH
GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account.
CVE-2022-29117 2 Fedoraproject, Microsoft 5 Fedora, .net, .net Core and 2 more 2024-02-28 5.0 MEDIUM 7.5 HIGH
.NET and Visual Studio Denial of Service Vulnerability
CVE-2022-24512 2 Fedoraproject, Microsoft 6 Fedora, .net, .net Core and 3 more 2024-02-28 6.8 MEDIUM 6.3 MEDIUM
.NET and Visual Studio Remote Code Execution Vulnerability
CVE-2022-24513 1 Microsoft 2 Visual Studio 2019, Visual Studio 2022 2024-02-28 4.6 MEDIUM 7.8 HIGH
Visual Studio Elevation of Privilege Vulnerability
CVE-2022-23267 2 Fedoraproject, Microsoft 6 Fedora, .net, .net Core and 3 more 2024-02-28 5.0 MEDIUM 7.5 HIGH
.NET and Visual Studio Denial of Service Vulnerability
CVE-2022-24464 2 Fedoraproject, Microsoft 5 Fedora, .net, .net Core and 2 more 2024-02-28 5.0 MEDIUM 7.5 HIGH
.NET and Visual Studio Denial of Service Vulnerability
CVE-2022-21986 2 Fedoraproject, Microsoft 4 Fedora, .net, Visual Studio 2019 and 1 more 2024-02-28 4.3 MEDIUM 7.5 HIGH
.NET Denial of Service Vulnerability
CVE-2021-43877 1 Microsoft 3 Asp.net Core, Visual Studio 2019, Visual Studio 2022 2024-02-28 4.6 MEDIUM 8.8 HIGH
ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability
CVE-2020-8927 6 Canonical, Debian, Fedoraproject and 3 more 10 Ubuntu Linux, Debian Linux, Fedora and 7 more 2024-02-28 6.4 MEDIUM 6.5 MEDIUM
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.