Msrc Microsoft Visual Studio 2017 Version 15.9 vulnerabilities
124 known vulnerabilities affecting msrc/microsoft_visual_studio_2017_version_15.9.
Total CVEs
124
CISA KEV
2
actively exploited
Public exploits
2
Exploited in wild
1
Severity breakdown
CRITICAL9HIGH95MEDIUM19LOW1
Vulnerabilities
Page 4 of 7
CVE-2022-24513HIGHCVSS 7.82022-04-12
CVE-2022-24513 [HIGH] Visual Studio Elevation of Privilege Vulnerability
Visual Studio Elevation of Privilege Vulnerability
Visual Studio: Visual Studio
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Remediation: Release Notes
Reference: http://aka.ms/vs/15/release/latest
Reference: https://docs.microsoft.co
msrc
CVE-2022-24765HIGHCVSS 6.02022-04-12
CVE-2022-24765 [MEDIUM] GitHub: Uncontrolled search for the Git directory in Git for Windows
GitHub: Uncontrolled search for the Git directory in Git for Windows
FAQ: Why is this GitHub CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in Git for Windows software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Upda
msrc
CVE-2022-24767HIGHCVSS 7.82022-04-12
CVE-2022-24767 [HIGH] GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account
GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account
FAQ: Why is this GitHub CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in Git for Windows software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds
msrc
CVE-2022-21871HIGHCVSS 7.02022-01-11
CVE-2022-21871 [HIGH] Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability
Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability
Windows Diagnostic Hub: Windows Diagnostic Hub
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: http
msrc
CVE-2021-3711CRITICALCVSS 9.82021-11-09
CVE-2021-3711 [CRITICAL] OpenSSL: CVE-2021-3711 SM2 Decryption Buffer Overflow
OpenSSL: CVE-2021-3711 SM2 Decryption Buffer Overflow
FAQ: Why is this OpenSSL Software Foundation CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in OpenSSL Software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Support
msrc
CVE-2021-42277MEDIUMCVSS 5.52021-11-09
CVE-2021-42277 [MEDIUM] Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents.
Windows Diagnostic Hub: Windows Diagnostic Hub
Microsoft: Microsoft
Customer Action Required: Yes
msrc
CVE-2021-42319MEDIUMCVSS 4.72021-11-09
CVE-2021-42319 [MEDIUM] Visual Studio Elevation of Privilege Vulnerability
Visual Studio Elevation of Privilege Vulnerability
Visual Studio: Visual Studio
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Remediation: Release Notes
Reference: http://aka.ms/vs/15/release/latest
Reference: https://docs.microsoft.
msrc
CVE-2020-1971HIGHCVSS 5.92021-10-12
CVE-2020-1971 [MEDIUM] OpenSSL: CVE-2020-1971 EDIPARTYNAME NULL pointer de-reference
OpenSSL: CVE-2020-1971 EDIPARTYNAME NULL pointer de-reference
FAQ: Why is this OpenSSL Software Foundation CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in OpenSSL Software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update
msrc
CVE-2021-3450HIGHCVSS 7.42021-10-12
CVE-2021-3450 [HIGH] OpenSSL: CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT
OpenSSL: CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT
FAQ: Why is this OpenSSL Software Foundation CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in OpenSSL Software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vuln
msrc
CVE-2021-3449HIGHCVSS 5.92021-10-12
CVE-2021-3449 [MEDIUM] OpenSSL: CVE-2021-3449 NULL pointer deref in signature_algorithms processing
OpenSSL: CVE-2021-3449 NULL pointer deref in signature_algorithms processing
FAQ: Why is this OpenSSL Software Foundation CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in OpenSSL Software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerab
msrc
CVE-2021-26434HIGHCVSS 7.82021-09-14
CVE-2021-26434 [HIGH] Visual Studio Elevation of Privilege Vulnerability
Visual Studio Elevation of Privilege Vulnerability
Visual Studio: Visual Studio
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Remediation: Release Notes
Reference: http://aka.ms/vs/15/release/latest
Reference: https://my.visualstudio.com/Downloads?q=Visual S
msrc
CVE-2021-36952HIGHCVSS 7.82021-09-14
CVE-2021-36952 [HIGH] Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
Visual Studio: Visual Studio
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Remediation: Release Notes
Reference: http://aka.ms/vs/15/release/latest
Reference: https://my.visualstudio.com/Downloads?q=Visual Stud
msrc
CVE-2021-26423HIGHCVSS 7.52021-08-10
CVE-2021-26423 [HIGH] .NET Core and Visual Studio Denial of Service Vulnerability
.NET Core and Visual Studio Denial of Service Vulnerability
.NET Core & Visual Studio: .NET Core & Visual Studio
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Remediation: Release Notes
Reference: http://aka.ms/vs/15/release/latest
Reference: https://my.
msrc
CVE-2021-34485MEDIUMCVSS 5.02021-08-10
CVE-2021-34485 [MEDIUM] .NET Core and Visual Studio Information Disclosure Vulnerability
.NET Core and Visual Studio Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of a specific dump file. The attacker needs to have local access to the target system and the dump file needs to be created in a specific way by a targe
msrc
CVE-2021-28313HIGHCVSS 7.82021-04-13
CVE-2021-28313 [HIGH] Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
Windows Diagnostic Hub: Windows Diagnostic Hub
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Se
msrc
CVE-2021-28322HIGHCVSS 7.82021-04-13
CVE-2021-28322 [HIGH] Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
Windows Diagnostic Hub: Windows Diagnostic Hub
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Se
msrc
CVE-2021-28321HIGHCVSS 7.82021-04-13
CVE-2021-28321 [HIGH] Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
Windows Diagnostic Hub: Windows Diagnostic Hub
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Se
msrc
CVE-2021-27064HIGHCVSS 7.82021-04-13
CVE-2021-27064 [HIGH] Visual Studio Installer Elevation of Privilege Vulnerability
Visual Studio Installer Elevation of Privilege Vulnerability
Visual Studio: Visual Studio
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Remediation: Release Notes
Reference: http://aka.ms/vs/15/release/latest
Reference: https://my.visualstudio.com/
msrc
CVE-2021-21300HIGHCVSS 8.8PoC2021-03-09
CVE-2021-21300 [HIGH] Git for Visual Studio Remote Code Execution Vulnerability
Git for Visual Studio Remote Code Execution Vulnerability
Visual Studio: Visual Studio
GitHub (maintainer security advisories): GitHub (maintainer security advisories)
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Remediation: Release Notes
Reference: http://aka.ms/vs/15/re
msrc
CVE-2021-1639HIGHCVSS 7.02021-02-09
CVE-2021-1639 [HIGH] Visual Studio Code Remote Code Execution Vulnerability
Visual Studio Code Remote Code Execution Vulnerability
Visual Studio: Visual Studio
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Remediation: Release Notes
Reference: http://aka.ms/vs/16/release/latest
Reference: https://code.visualstudio.com/Download
Re
msrc