Total
91 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2025-49739 | 1 Microsoft | 4 Visual Studio, Visual Studio 2017, Visual Studio 2019 and 1 more | 2025-07-16 | N/A | 8.8 HIGH |
Improper link resolution before file access ('link following') in Visual Studio allows an unauthorized attacker to elevate privileges over a network. | |||||
CVE-2025-24998 | 1 Microsoft | 3 Visual Studio 2017, Visual Studio 2019, Visual Studio 2022 | 2025-07-01 | N/A | 7.3 HIGH |
Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally. | |||||
CVE-2022-35777 | 1 Microsoft | 4 Visual Studio, Visual Studio 2017, Visual Studio 2019 and 1 more | 2025-05-29 | N/A | N/A |
Visual Studio Remote Code Execution Vulnerability | |||||
CVE-2025-32703 | 1 Microsoft | 3 Visual Studio 2017, Visual Studio 2019, Visual Studio 2022 | 2025-05-19 | N/A | 5.5 MEDIUM |
Insufficient granularity of access control in Visual Studio allows an authorized attacker to disclose information locally. | |||||
CVE-2025-21176 | 3 Apple, Linux, Microsoft | 20 Macos, Linux Kernel, .net and 17 more | 2025-05-06 | N/A | N/A |
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability | |||||
CVE-2025-21172 | 3 Apple, Linux, Microsoft | 7 Macos, Linux Kernel, .net and 4 more | 2025-05-06 | N/A | N/A |
.NET and Visual Studio Remote Code Execution Vulnerability | |||||
CVE-2025-21206 | 1 Microsoft | 3 Visual Studio 2017, Visual Studio 2019, Visual Studio 2022 | 2025-02-28 | N/A | 7.3 HIGH |
Visual Studio Installer Elevation of Privilege Vulnerability | |||||
CVE-2020-1147 | 1 Microsoft | 14 .net Core, .net Framework, Sharepoint Enterprise Server and 11 more | 2025-02-11 | 6.8 MEDIUM | 7.8 HIGH |
A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input, aka '.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability'. | |||||
CVE-2025-21178 | 1 Microsoft | 3 Visual Studio 2017, Visual Studio 2019, Visual Studio 2022 | 2025-01-27 | N/A | 8.8 HIGH |
Visual Studio Remote Code Execution Vulnerability | |||||
CVE-2022-29148 | 1 Microsoft | 1 Visual Studio 2017 | 2025-01-02 | 6.8 MEDIUM | 7.8 HIGH |
Visual Studio Remote Code Execution Vulnerability | |||||
CVE-2022-21871 | 1 Microsoft | 13 Visual Studio 2017, Visual Studio 2019, Windows 10 1507 and 10 more | 2024-11-14 | 7.2 HIGH | 7.8 HIGH |
Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability | |||||
CVE-2024-43603 | 1 Microsoft | 4 Visual Studio, Visual Studio 2017, Visual Studio 2019 and 1 more | 2024-10-17 | N/A | 5.5 MEDIUM |
Visual Studio Collector Service Denial of Service Vulnerability | |||||
CVE-2024-43590 | 1 Microsoft | 3 Visual Studio 2017, Visual Studio 2019, Visual Studio 2022 | 2024-10-16 | N/A | 7.8 HIGH |
Visual C++ Redistributable Installer Elevation of Privilege Vulnerability | |||||
CVE-2021-1651 | 1 Microsoft | 6 Visual Studio, Visual Studio 2017, Visual Studio 2019 and 3 more | 2024-10-08 | 7.2 HIGH | 7.8 HIGH |
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability | |||||
CVE-2021-1680 | 1 Microsoft | 6 Visual Studio, Visual Studio 2017, Visual Studio 2019 and 3 more | 2024-10-08 | 4.6 MEDIUM | 7.8 HIGH |
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability | |||||
CVE-2022-24767 | 2 Git For Windows Project, Microsoft | 4 Git For Windows, Visual Studio 2017, Visual Studio 2019 and 1 more | 2024-10-01 | 6.9 MEDIUM | 7.8 HIGH |
GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account. | |||||
CVE-2024-29060 | 1 Microsoft | 3 Visual Studio 2017, Visual Studio 2019, Visual Studio 2022 | 2024-07-02 | N/A | 6.7 MEDIUM |
Visual Studio Elevation of Privilege Vulnerability | |||||
CVE-2019-1211 | 1 Microsoft | 2 Visual Studio 2017, Visual Studio 2019 | 2024-05-29 | 3.7 LOW | 7.3 HIGH |
An elevation of privilege vulnerability exists in Git for Visual Studio when it improperly parses configuration files. An attacker who successfully exploited the vulnerability could execute code in the context of another local user. To exploit the vulnerability, an authenticated attacker would need to modify Git configuration files on a system prior to a full installation of the application. The attacker would then need to convince another user on the system to execute specific Git commands. The update addresses the issue by changing the permissions required to edit configuration files. | |||||
CVE-2023-36796 | 1 Microsoft | 16 .net, .net Framework, Visual Studio 2017 and 13 more | 2024-05-29 | N/A | 7.8 HIGH |
Visual Studio Remote Code Execution Vulnerability | |||||
CVE-2023-36794 | 1 Microsoft | 16 .net, .net Framework, Visual Studio 2017 and 13 more | 2024-05-29 | N/A | 7.8 HIGH |
Visual Studio Remote Code Execution Vulnerability |