Microsoft Visual Studio 2012 Update 5 vulnerabilities
6 known vulnerabilities affecting microsoft/microsoft_visual_studio_2012_update_5.
Total CVEs
6
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH6
Vulnerabilities
Page 1 of 1
CVE-2022-35825HIGHCVSS 8.8≥ 11.0.0, < 11.0.61252.02022-08-09
CVE-2022-35825 [HIGH] Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
cvelistv5
CVE-2022-35777HIGHCVSS 8.8≥ 11.0.0, < 11.0.61252.02022-08-09
CVE-2022-35777 [HIGH] Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
cvelistv5
CVE-2022-35827HIGHCVSS 8.8≥ 11.0.0, < 11.0.61252.02022-08-09
CVE-2022-35827 [HIGH] Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
cvelistv5
CVE-2022-35826HIGHCVSS 8.8≥ 11.0.0, < 11.0.61252.02022-08-09
CVE-2022-35826 [HIGH] Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
cvelistv5
CVE-2020-16856HIGHCVSS 7.8≥ 11.0.0, < publication2020-09-11
CVE-2020-16856 [HIGH] CVE-2020-16856: <p>A remote code execution vulnerability exists in Visual Studio when it improperly handles objects
A remote code execution vulnerability exists in Visual Studio when it improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker cou
cvelistv5nvd
CVE-2020-16874HIGHCVSS 7.8≥ 11.0.0, < publication2020-09-11
CVE-2020-16874 [HIGH] CVE-2020-16874: <p>A remote code execution vulnerability exists in Visual Studio when it improperly handles objects
A remote code execution vulnerability exists in Visual Studio when it improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker cou
cvelistv5nvd