Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:a:microsoft:visual_studio_2019:16.8:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2021-27064 |
Visual Studio Installer Elevation of Privilege Vulnerability Published: April 13, 2021; 4:15:15 PM -0400 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2021-26701 |
.NET Core Remote Code Execution Vulnerability Published: February 25, 2021; 6:15:16 PM -0500 |
V3.1: 8.1 HIGH V2.0: 7.5 HIGH |
CVE-2021-1721 |
.NET Core and Visual Studio Denial of Service Vulnerability Published: February 25, 2021; 6:15:13 PM -0500 |
V3.1: 6.5 MEDIUM V2.0: 4.3 MEDIUM |
CVE-2021-1639 |
Visual Studio Code Remote Code Execution Vulnerability Published: February 25, 2021; 6:15:13 PM -0500 |
V3.1: 7.0 HIGH V2.0: 6.8 MEDIUM |
CVE-2021-1723 |
ASP.NET Core and Visual Studio Denial of Service Vulnerability Published: January 12, 2021; 3:15:34 PM -0500 |
V3.1: 7.5 HIGH V2.0: 5.0 MEDIUM |
CVE-2021-1680 |
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability Published: January 12, 2021; 3:15:32 PM -0500 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2021-1651 |
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability Published: January 12, 2021; 3:15:30 PM -0500 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2020-17156 |
Visual Studio Remote Code Execution Vulnerability Published: December 09, 2020; 7:15:16 PM -0500 |
V3.1: 7.8 HIGH V2.0: 6.8 MEDIUM |
CVE-2020-17100 |
Visual Studio Tampering Vulnerability Published: November 11, 2020; 2:15:19 AM -0500 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2020-26870 |
Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements. Published: October 07, 2020; 12:15:18 PM -0400 |
V3.1: 6.1 MEDIUM V2.0: 4.3 MEDIUM |
CVE-2020-8927 |
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. Published: September 15, 2020; 6:15:12 AM -0400 |
V3.1: 6.5 MEDIUM V2.0: 6.4 MEDIUM |