Msrc Microsoft Visual Studio 2019 Version 16.11 vulnerabilities

106 known vulnerabilities affecting msrc/microsoft_visual_studio_2019_version_16.11.

Total CVEs
106
CISA KEV
1
actively exploited
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH85MEDIUM17LOW1

Vulnerabilities

Page 5 of 6
CVE-2022-38013HIGHCVSS 7.52022-09-13
CVE-2022-38013 [HIGH] .NET Core and Visual Studio Denial of Service Vulnerability .NET Core and Visual Studio Denial of Service Vulnerability .NET and Visual Studio: .NET and Visual Studio Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Remediation: Release Notes Reference: https://my.visualstudio.com/Downl
msrc
CVE-2022-35827HIGHCVSS 8.82022-08-09
CVE-2022-35827 [HIGH] Visual Studio Remote Code Execution Vulnerability Visual Studio Remote Code Execution Vulnerability FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires that a user open a specially crafted file. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-
msrc
CVE-2022-35826HIGHCVSS 8.82022-08-09
CVE-2022-35826 [HIGH] Visual Studio Remote Code Execution Vulnerability Visual Studio Remote Code Execution Vulnerability FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires that a user open a specially crafted file. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-
msrc
CVE-2022-35825HIGHCVSS 8.82022-08-09
CVE-2022-35825 [HIGH] Visual Studio Remote Code Execution Vulnerability Visual Studio Remote Code Execution Vulnerability FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires that a user open a specially crafted file. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-
msrc
CVE-2022-35777HIGHCVSS 8.82022-08-09
CVE-2022-35777 [HIGH] Visual Studio Remote Code Execution Vulnerability Visual Studio Remote Code Execution Vulnerability FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires that a user open a specially crafted file. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-
msrc
CVE-2022-34716MEDIUMCVSS 5.92022-08-09
CVE-2022-34716 [MEDIUM] .NET Spoofing Vulnerability .NET Spoofing Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to successfully execute a blind XXE attack. FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) but have no effect on integrity (I:N) or on availability (
msrc
CVE-2022-30184MEDIUMCVSS 5.52022-06-14
CVE-2022-30184 [MEDIUM] .NET and Visual Studio Information Disclosure Vulnerability .NET and Visual Studio Information Disclosure Vulnerability FAQ: I am using Visual Studio 2019 for Mac version 8.10. Why do the links in the Security Update table point me to the updates for Visual Studio 2022 for Mac? The .NET 5.0.X SDK that ships within Visual Studio 2019 for Mac is no longer supported, and will no longer receive security updates. The accompanying 3.1.X runtime is still in support, and will co
msrc
CVE-2022-29117HIGHCVSS 7.52022-05-10
CVE-2022-29117 [HIGH] .NET and Visual Studio Denial of Service Vulnerability .NET and Visual Studio Denial of Service Vulnerability .NET and Visual Studio: .NET and Visual Studio Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5014330 Reference
msrc
CVE-2022-29145HIGHCVSS 7.52022-05-10
CVE-2022-29145 [HIGH] .NET and Visual Studio Denial of Service Vulnerability .NET and Visual Studio Denial of Service Vulnerability .NET and Visual Studio: .NET and Visual Studio Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5014330 Reference
msrc
CVE-2022-23267HIGHCVSS 7.52022-05-10
CVE-2022-23267 [HIGH] .NET and Visual Studio Denial of Service Vulnerability .NET and Visual Studio Denial of Service Vulnerability .NET and Visual Studio: .NET and Visual Studio Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5014326 Reference
msrc
CVE-2022-24513HIGHCVSS 7.82022-04-12
CVE-2022-24513 [HIGH] Visual Studio Elevation of Privilege Vulnerability Visual Studio Elevation of Privilege Vulnerability Visual Studio: Visual Studio Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Remediation: Release Notes Reference: http://aka.ms/vs/15/release/latest Reference: https://docs.microsoft.co
msrc
CVE-2022-24765HIGHCVSS 6.02022-04-12
CVE-2022-24765 [MEDIUM] GitHub: Uncontrolled search for the Git directory in Git for Windows GitHub: Uncontrolled search for the Git directory in Git for Windows FAQ: Why is this GitHub CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Git for Windows software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Upda
msrc
CVE-2022-24767HIGHCVSS 7.82022-04-12
CVE-2022-24767 [HIGH] GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account FAQ: Why is this GitHub CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Git for Windows software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds
msrc
CVE-2022-24464HIGHCVSS 7.52022-03-08
CVE-2022-24464 [HIGH] .NET and Visual Studio Denial of Service Vulnerability .NET and Visual Studio Denial of Service Vulnerability .NET and Visual Studio: .NET and Visual Studio Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Remediation: Release Notes Reference: https://dotnet.microsoft.com/download/dotne
msrc
CVE-2020-8927MEDIUMCVSS 6.52022-03-08
CVE-2020-8927 [MEDIUM] Brotli Library Buffer Overflow Vulnerability Brotli Library Buffer Overflow Vulnerability FAQ: Why is this Google LLC CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in the Brotli library which is consumed by .NET and by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of .NET and Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigne
msrc
CVE-2022-24512MEDIUMCVSS 6.32022-03-08
CVE-2022-24512 [MEDIUM] .NET and Visual Studio Remote Code Execution Vulnerability .NET and Visual Studio Remote Code Execution Vulnerability FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L) and availability (A:L). What does that mean for this vulnerability? While we cannot rule out the impact to Confidentiality, Integrity, and Availability, the ability to exploit this vulnerability by itself is
msrc
CVE-2022-21986HIGHCVSS 7.52022-02-08
CVE-2022-21986 [HIGH] .NET Denial of Service Vulnerability .NET Denial of Service Vulnerability FAQ: What .NET component is affected by this denial of service vulnerability? This vulnerability affects applications that utilize the Kestrel web server when processing certain HTTP/2 and HTTP/3 requests. Kestrel Web Server: Kestrel Web Server Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:E
msrc
CVE-2021-43877HIGHCVSS 8.82021-12-14
CVE-2021-43877 [HIGH] ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability ASP.NET Core & Visual Studio: ASP.NET Core & Visual Studio Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Remediation: Release Notes Reference: https://my.visualstudio.com/Dow
msrc
CVE-2021-3711CRITICALCVSS 9.82021-11-09
CVE-2021-3711 [CRITICAL] OpenSSL: CVE-2021-3711 SM2 Decryption Buffer Overflow OpenSSL: CVE-2021-3711 SM2 Decryption Buffer Overflow FAQ: Why is this OpenSSL Software Foundation CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in OpenSSL Software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Support
msrc
CVE-2021-42277MEDIUMCVSS 5.52021-11-09
CVE-2021-42277 [MEDIUM] Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents. Windows Diagnostic Hub: Windows Diagnostic Hub Microsoft: Microsoft Customer Action Required: Yes
msrc