Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): Visual Studio
- Search Type: Search All
- Match: Exact
- CPE Name Search: false
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2024-1569 |
parisneo/lollms-webui is vulnerable to a denial of service (DoS) attack due to uncontrolled resource consumption. Attackers can exploit the `/open_code_in_vs_code` and similar endpoints without authentication by sending repeated HTTP POST requests, leading to the opening of Visual Studio Code or the default folder opener (e.g., File Explorer, xdg-open) multiple times. This can render the host machine unusable by exhausting system resources. The vulnerability is present in the latest version of the software. Published: April 15, 2024; 8:15:09 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-21409 |
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability Published: April 09, 2024; 1:15:34 PM -0400 |
V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2024-26165 |
Visual Studio Code Elevation of Privilege Vulnerability Published: March 12, 2024; 1:15:55 PM -0400 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2024-21392 |
.NET and Visual Studio Denial of Service Vulnerability Published: March 12, 2024; 1:15:49 PM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2024-20656 |
Visual Studio Elevation of Privilege Vulnerability Published: January 09, 2024; 1:15:48 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-0057 |
NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability Published: January 09, 2024; 1:15:46 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2020-17163 |
Visual Studio Code Python Extension Remote Code Execution Vulnerability Published: December 29, 2023; 12:15:49 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-46944 |
An issue in GitKraken GitLens before v.14.0.0 allows an attacker to execute arbitrary code via a crafted file to the Visual Studio Codes workspace trust component. Published: November 28, 2023; 5:15:06 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36049 |
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability Published: November 14, 2023; 4:15:10 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-36042 |
Visual Studio Denial of Service Vulnerability Published: November 14, 2023; 1:15:34 PM -0500 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-36018 |
Visual Studio Code Jupyter Extension Spoofing Vulnerability Published: November 14, 2023; 1:15:31 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-36799 |
.NET Core and Visual Studio Denial of Service Vulnerability Published: September 12, 2023; 1:15:15 PM -0400 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-36796 |
Visual Studio Remote Code Execution Vulnerability Published: September 12, 2023; 1:15:15 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36794 |
Visual Studio Remote Code Execution Vulnerability Published: September 12, 2023; 1:15:14 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36793 |
Visual Studio Remote Code Execution Vulnerability Published: September 12, 2023; 1:15:14 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36792 |
Visual Studio Remote Code Execution Vulnerability Published: September 12, 2023; 1:15:14 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36759 |
Visual Studio Elevation of Privilege Vulnerability Published: September 12, 2023; 1:15:11 PM -0400 |
V3.1: 6.7 MEDIUM V2.0:(not available) |
CVE-2023-36758 |
Visual Studio Elevation of Privilege Vulnerability Published: September 12, 2023; 1:15:11 PM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-36742 |
Visual Studio Code Remote Code Execution Vulnerability Published: September 12, 2023; 1:15:10 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-38180 |
.NET and Visual Studio Denial of Service Vulnerability Published: August 08, 2023; 3:15:10 PM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |