Msrc Microsoft Visual Studio 2017 Version 15.9 vulnerabilities

124 known vulnerabilities affecting msrc/microsoft_visual_studio_2017_version_15.9.

Total CVEs
124
CISA KEV
2
actively exploited
Public exploits
2
Exploited in wild
1
Severity breakdown
CRITICAL9HIGH95MEDIUM19LOW1

Vulnerabilities

Page 4 of 7
CVE-2022-24513HIGHCVSS 7.82022-04-12
CVE-2022-24513 [HIGH] Visual Studio Elevation of Privilege Vulnerability Visual Studio Elevation of Privilege Vulnerability Visual Studio: Visual Studio Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Remediation: Release Notes Reference: http://aka.ms/vs/15/release/latest Reference: https://docs.microsoft.co
msrc
CVE-2022-24765HIGHCVSS 6.02022-04-12
CVE-2022-24765 [MEDIUM] GitHub: Uncontrolled search for the Git directory in Git for Windows GitHub: Uncontrolled search for the Git directory in Git for Windows FAQ: Why is this GitHub CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Git for Windows software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Upda
msrc
CVE-2022-24767HIGHCVSS 7.82022-04-12
CVE-2022-24767 [HIGH] GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account FAQ: Why is this GitHub CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Git for Windows software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds
msrc
CVE-2022-21871HIGHCVSS 7.02022-01-11
CVE-2022-21871 [HIGH] Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability Windows Diagnostic Hub: Windows Diagnostic Hub Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: http
msrc
CVE-2021-3711CRITICALCVSS 9.82021-11-09
CVE-2021-3711 [CRITICAL] OpenSSL: CVE-2021-3711 SM2 Decryption Buffer Overflow OpenSSL: CVE-2021-3711 SM2 Decryption Buffer Overflow FAQ: Why is this OpenSSL Software Foundation CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in OpenSSL Software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Support
msrc
CVE-2021-42277MEDIUMCVSS 5.52021-11-09
CVE-2021-42277 [MEDIUM] Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents. Windows Diagnostic Hub: Windows Diagnostic Hub Microsoft: Microsoft Customer Action Required: Yes
msrc
CVE-2021-42319MEDIUMCVSS 4.72021-11-09
CVE-2021-42319 [MEDIUM] Visual Studio Elevation of Privilege Vulnerability Visual Studio Elevation of Privilege Vulnerability Visual Studio: Visual Studio Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Remediation: Release Notes Reference: http://aka.ms/vs/15/release/latest Reference: https://docs.microsoft.
msrc
CVE-2020-1971HIGHCVSS 5.92021-10-12
CVE-2020-1971 [MEDIUM] OpenSSL: CVE-2020-1971 EDIPARTYNAME NULL pointer de-reference OpenSSL: CVE-2020-1971 EDIPARTYNAME NULL pointer de-reference FAQ: Why is this OpenSSL Software Foundation CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in OpenSSL Software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update
msrc
CVE-2021-3450HIGHCVSS 7.42021-10-12
CVE-2021-3450 [HIGH] OpenSSL: CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT OpenSSL: CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT FAQ: Why is this OpenSSL Software Foundation CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in OpenSSL Software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vuln
msrc
CVE-2021-3449HIGHCVSS 5.92021-10-12
CVE-2021-3449 [MEDIUM] OpenSSL: CVE-2021-3449 NULL pointer deref in signature_algorithms processing OpenSSL: CVE-2021-3449 NULL pointer deref in signature_algorithms processing FAQ: Why is this OpenSSL Software Foundation CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in OpenSSL Software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerab
msrc
CVE-2021-26434HIGHCVSS 7.82021-09-14
CVE-2021-26434 [HIGH] Visual Studio Elevation of Privilege Vulnerability Visual Studio Elevation of Privilege Vulnerability Visual Studio: Visual Studio Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Remediation: Release Notes Reference: http://aka.ms/vs/15/release/latest Reference: https://my.visualstudio.com/Downloads?q=Visual S
msrc
CVE-2021-36952HIGHCVSS 7.82021-09-14
CVE-2021-36952 [HIGH] Visual Studio Remote Code Execution Vulnerability Visual Studio Remote Code Execution Vulnerability Visual Studio: Visual Studio Microsoft: Microsoft Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Remediation: Release Notes Reference: http://aka.ms/vs/15/release/latest Reference: https://my.visualstudio.com/Downloads?q=Visual Stud
msrc
CVE-2021-26423HIGHCVSS 7.52021-08-10
CVE-2021-26423 [HIGH] .NET Core and Visual Studio Denial of Service Vulnerability .NET Core and Visual Studio Denial of Service Vulnerability .NET Core & Visual Studio: .NET Core & Visual Studio Microsoft: Microsoft Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Remediation: Release Notes Reference: http://aka.ms/vs/15/release/latest Reference: https://my.
msrc
CVE-2021-34485MEDIUMCVSS 5.02021-08-10
CVE-2021-34485 [MEDIUM] .NET Core and Visual Studio Information Disclosure Vulnerability .NET Core and Visual Studio Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of a specific dump file. The attacker needs to have local access to the target system and the dump file needs to be created in a specific way by a targe
msrc
CVE-2021-28313HIGHCVSS 7.82021-04-13
CVE-2021-28313 [HIGH] Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability Windows Diagnostic Hub: Windows Diagnostic Hub Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Se
msrc
CVE-2021-28322HIGHCVSS 7.82021-04-13
CVE-2021-28322 [HIGH] Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability Windows Diagnostic Hub: Windows Diagnostic Hub Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Se
msrc
CVE-2021-28321HIGHCVSS 7.82021-04-13
CVE-2021-28321 [HIGH] Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability Windows Diagnostic Hub: Windows Diagnostic Hub Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Se
msrc
CVE-2021-27064HIGHCVSS 7.82021-04-13
CVE-2021-27064 [HIGH] Visual Studio Installer Elevation of Privilege Vulnerability Visual Studio Installer Elevation of Privilege Vulnerability Visual Studio: Visual Studio Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Remediation: Release Notes Reference: http://aka.ms/vs/15/release/latest Reference: https://my.visualstudio.com/
msrc
CVE-2021-21300HIGHCVSS 8.8PoC2021-03-09
CVE-2021-21300 [HIGH] Git for Visual Studio Remote Code Execution Vulnerability Git for Visual Studio Remote Code Execution Vulnerability Visual Studio: Visual Studio GitHub (maintainer security advisories): GitHub (maintainer security advisories) Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Remediation: Release Notes Reference: http://aka.ms/vs/15/re
msrc
CVE-2021-1639HIGHCVSS 7.02021-02-09
CVE-2021-1639 [HIGH] Visual Studio Code Remote Code Execution Vulnerability Visual Studio Code Remote Code Execution Vulnerability Visual Studio: Visual Studio Microsoft: Microsoft Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Remediation: Release Notes Reference: http://aka.ms/vs/16/release/latest Reference: https://code.visualstudio.com/Download Re
msrc