Msrc Microsoft Visual Studio 2019 Version 16.11 vulnerabilities
106 known vulnerabilities affecting msrc/microsoft_visual_studio_2019_version_16.11.
Total CVEs
106
CISA KEV
1
actively exploited
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH85MEDIUM17LOW1
Vulnerabilities
Page 5 of 6
CVE-2022-38013HIGHCVSS 7.52022-09-13
CVE-2022-38013 [HIGH] .NET Core and Visual Studio Denial of Service Vulnerability
.NET Core and Visual Studio Denial of Service Vulnerability
.NET and Visual Studio: .NET and Visual Studio
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Remediation: Release Notes
Reference: https://my.visualstudio.com/Downl
msrc
CVE-2022-35827HIGHCVSS 8.82022-08-09
CVE-2022-35827 [HIGH] Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of the vulnerability requires that a user open a specially crafted file.
In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
In a web-
msrc
CVE-2022-35826HIGHCVSS 8.82022-08-09
CVE-2022-35826 [HIGH] Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of the vulnerability requires that a user open a specially crafted file.
In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
In a web-
msrc
CVE-2022-35825HIGHCVSS 8.82022-08-09
CVE-2022-35825 [HIGH] Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of the vulnerability requires that a user open a specially crafted file.
In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
In a web-
msrc
CVE-2022-35777HIGHCVSS 8.82022-08-09
CVE-2022-35777 [HIGH] Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of the vulnerability requires that a user open a specially crafted file.
In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
In a web-
msrc
CVE-2022-34716MEDIUMCVSS 5.92022-08-09
CVE-2022-34716 [MEDIUM] .NET Spoofing Vulnerability
.NET Spoofing Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to successfully execute a blind XXE attack.
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) but have no effect on integrity (I:N) or on availability (
msrc
CVE-2022-30184MEDIUMCVSS 5.52022-06-14
CVE-2022-30184 [MEDIUM] .NET and Visual Studio Information Disclosure Vulnerability
.NET and Visual Studio Information Disclosure Vulnerability
FAQ: I am using Visual Studio 2019 for Mac version 8.10. Why do the links in the Security Update table point me to the updates for Visual Studio 2022 for Mac?
The .NET 5.0.X SDK that ships within Visual Studio 2019 for Mac is no longer supported, and will no longer receive security updates. The accompanying 3.1.X runtime is still in support, and will co
msrc
CVE-2022-29117HIGHCVSS 7.52022-05-10
CVE-2022-29117 [HIGH] .NET and Visual Studio Denial of Service Vulnerability
.NET and Visual Studio Denial of Service Vulnerability
.NET and Visual Studio: .NET and Visual Studio
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5014330
Reference
msrc
CVE-2022-29145HIGHCVSS 7.52022-05-10
CVE-2022-29145 [HIGH] .NET and Visual Studio Denial of Service Vulnerability
.NET and Visual Studio Denial of Service Vulnerability
.NET and Visual Studio: .NET and Visual Studio
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5014330
Reference
msrc
CVE-2022-23267HIGHCVSS 7.52022-05-10
CVE-2022-23267 [HIGH] .NET and Visual Studio Denial of Service Vulnerability
.NET and Visual Studio Denial of Service Vulnerability
.NET and Visual Studio: .NET and Visual Studio
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5014326
Reference
msrc
CVE-2022-24513HIGHCVSS 7.82022-04-12
CVE-2022-24513 [HIGH] Visual Studio Elevation of Privilege Vulnerability
Visual Studio Elevation of Privilege Vulnerability
Visual Studio: Visual Studio
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Remediation: Release Notes
Reference: http://aka.ms/vs/15/release/latest
Reference: https://docs.microsoft.co
msrc
CVE-2022-24765HIGHCVSS 6.02022-04-12
CVE-2022-24765 [MEDIUM] GitHub: Uncontrolled search for the Git directory in Git for Windows
GitHub: Uncontrolled search for the Git directory in Git for Windows
FAQ: Why is this GitHub CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in Git for Windows software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Upda
msrc
CVE-2022-24767HIGHCVSS 7.82022-04-12
CVE-2022-24767 [HIGH] GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account
GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account
FAQ: Why is this GitHub CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in Git for Windows software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds
msrc
CVE-2022-24464HIGHCVSS 7.52022-03-08
CVE-2022-24464 [HIGH] .NET and Visual Studio Denial of Service Vulnerability
.NET and Visual Studio Denial of Service Vulnerability
.NET and Visual Studio: .NET and Visual Studio
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Remediation: Release Notes
Reference: https://dotnet.microsoft.com/download/dotne
msrc
CVE-2020-8927MEDIUMCVSS 6.52022-03-08
CVE-2020-8927 [MEDIUM] Brotli Library Buffer Overflow Vulnerability
Brotli Library Buffer Overflow Vulnerability
FAQ: Why is this Google LLC CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in the Brotli library which is consumed by .NET and by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of .NET and Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigne
msrc
CVE-2022-24512MEDIUMCVSS 6.32022-03-08
CVE-2022-24512 [MEDIUM] .NET and Visual Studio Remote Code Execution Vulnerability
.NET and Visual Studio Remote Code Execution Vulnerability
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L) and availability (A:L). What does that mean for this vulnerability?
While we cannot rule out the impact to Confidentiality, Integrity, and Availability, the ability to exploit this vulnerability by itself is
msrc
CVE-2022-21986HIGHCVSS 7.52022-02-08
CVE-2022-21986 [HIGH] .NET Denial of Service Vulnerability
.NET Denial of Service Vulnerability
FAQ: What .NET component is affected by this denial of service vulnerability?
This vulnerability affects applications that utilize the Kestrel web server when processing certain HTTP/2 and HTTP/3 requests.
Kestrel Web Server: Kestrel Web Server
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:E
msrc
CVE-2021-43877HIGHCVSS 8.82021-12-14
CVE-2021-43877 [HIGH] ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability
ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability
ASP.NET Core & Visual Studio: ASP.NET Core & Visual Studio
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Remediation: Release Notes
Reference: https://my.visualstudio.com/Dow
msrc
CVE-2021-3711CRITICALCVSS 9.82021-11-09
CVE-2021-3711 [CRITICAL] OpenSSL: CVE-2021-3711 SM2 Decryption Buffer Overflow
OpenSSL: CVE-2021-3711 SM2 Decryption Buffer Overflow
FAQ: Why is this OpenSSL Software Foundation CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in OpenSSL Software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Support
msrc
CVE-2021-42277MEDIUMCVSS 5.52021-11-09
CVE-2021-42277 [MEDIUM] Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents.
Windows Diagnostic Hub: Windows Diagnostic Hub
Microsoft: Microsoft
Customer Action Required: Yes
msrc