Msrc Microsoft Visual Studio 2022 Version 17.2 vulnerabilities
72 known vulnerabilities affecting msrc/microsoft_visual_studio_2022_version_17.2.
Total CVEs
72
CISA KEV
2
actively exploited
Public exploits
1
Exploited in wild
2
Severity breakdown
CRITICAL1HIGH59MEDIUM12
Vulnerabilities
Page 4 of 4
CVE-2023-21567MEDIUMCVSS 5.62023-02-14
CVE-2023-21567 [MEDIUM] CWE-59 Visual Studio Denial of Service Vulnerability
Visual Studio Denial of Service Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of this vulnerability requires that a local user executes the Visual Studio installer
FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?
Any authenticated attacker could trigger this
msrc
CVE-2022-41089HIGHCVSS 7.82022-12-13
CVE-2022-41089 [HIGH] .NET Framework Remote Code Execution Vulnerability
.NET Framework Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.
For example, when the score indicates that
msrc
CVE-2022-39253HIGHCVSS 5.52022-11-08
CVE-2022-39253 [MEDIUM] GitHub: CVE-2022-39253 Local clone optimization dereferences symbolic links by default
GitHub: CVE-2022-39253 Local clone optimization dereferences symbolic links by default
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would th
msrc
CVE-2022-41119HIGHCVSS 7.82022-11-08
CVE-2022-41119 [HIGH] Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.
The vulnerable endpoint is only available ove
msrc
CVE-2022-41032HIGHCVSS 7.82022-10-11
CVE-2022-41032 [HIGH] NuGet Client Elevation of Privilege Vulnerability
NuGet Client Elevation of Privilege Vulnerability
FAQ: Are any other products affected by this vulnerability?
Yes. See the following list of affected versions of NuGet.exe, NuGet.Commands, NuGet.CommandLine, and NuGet.Protocol. Customers using any of these affected versions please see for information about how to fix the vulnerability.
Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol 6.3.0 version or earlie
msrc
CVE-2022-38013HIGHCVSS 7.52022-09-13
CVE-2022-38013 [HIGH] .NET Core and Visual Studio Denial of Service Vulnerability
.NET Core and Visual Studio Denial of Service Vulnerability
.NET and Visual Studio: .NET and Visual Studio
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Remediation: Release Notes
Reference: https://my.visualstudio.com/Downl
msrc
CVE-2022-35827HIGHCVSS 8.82022-08-09
CVE-2022-35827 [HIGH] Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of the vulnerability requires that a user open a specially crafted file.
In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
In a web-
msrc
CVE-2022-35826HIGHCVSS 8.82022-08-09
CVE-2022-35826 [HIGH] Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of the vulnerability requires that a user open a specially crafted file.
In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
In a web-
msrc
CVE-2022-35825HIGHCVSS 8.82022-08-09
CVE-2022-35825 [HIGH] Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of the vulnerability requires that a user open a specially crafted file.
In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
In a web-
msrc
CVE-2022-35777HIGHCVSS 8.82022-08-09
CVE-2022-35777 [HIGH] Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of the vulnerability requires that a user open a specially crafted file.
In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
In a web-
msrc
CVE-2022-34716MEDIUMCVSS 5.92022-08-09
CVE-2022-34716 [MEDIUM] .NET Spoofing Vulnerability
.NET Spoofing Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to successfully execute a blind XXE attack.
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) but have no effect on integrity (I:N) or on availability (
msrc
CVE-2022-30184MEDIUMCVSS 5.52022-06-14
CVE-2022-30184 [MEDIUM] .NET and Visual Studio Information Disclosure Vulnerability
.NET and Visual Studio Information Disclosure Vulnerability
FAQ: I am using Visual Studio 2019 for Mac version 8.10. Why do the links in the Security Update table point me to the updates for Visual Studio 2022 for Mac?
The .NET 5.0.X SDK that ships within Visual Studio 2019 for Mac is no longer supported, and will no longer receive security updates. The accompanying 3.1.X runtime is still in support, and will co
msrc
← Previous4 / 4