Download
| Alert*
oval:org.secpod.oval:def:77643
Microsoft Visual Studio 2022 is installed oval:org.secpod.oval:def:85414 The host is installed with Visual Studio and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact. oval:org.secpod.oval:def:78759 The host is installed with Microsoft Visual Studio 2017, 2019 or 2022 is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow an unspecified impact. oval:org.secpod.oval:def:91827 The host is installed with Visual Studio 2022 or .NET core runtime 6.0 or .NET core runtime 7.0 ASP .NET core 2.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers can now ... oval:org.secpod.oval:def:91829 The host is installed with Visual Studio 2022 or .NET core runtime 6.0 or .NET core runtime 7.0 or ASP .NET core 2.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause d ... oval:org.secpod.oval:def:77642 The host is installed with Visual Studio or .NET Core products and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause denial of service attacks. oval:org.secpod.oval:def:82728 The host is installed with Visual Studio and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact. oval:org.secpod.oval:def:82729 The host is installed with Visual Studio and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact. oval:org.secpod.oval:def:82730 The host is installed with Visual Studio and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact. oval:org.secpod.oval:def:82731 The host is installed with Visual Studio and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact. oval:org.secpod.oval:def:78761 The host is installed with Microsoft Visual Studio 2017, 2019 or 2022 is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow an unspecified impact. oval:org.secpod.oval:def:84774 The host is installed with Microsoft Visual Studio or .NET Core and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow an attacker to gain privileges of the user. oval:org.secpod.oval:def:81513 The host is installed with Visual Studio, .NET Core products and is prone to a information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact. oval:org.secpod.oval:def:79930 The host is installed with Visual Studio, ASP .NET core or .NET Core products and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact. oval:org.secpod.oval:def:79929 The host is installed with Visual Studio, ASP .NET core or .NET Core products and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact. oval:org.secpod.oval:def:79931 The host is installed with Visual Studio, ASP .NET core or .NET Core products and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact. oval:org.secpod.oval:def:78022 The host is installed with Visual Studio, ASP .NET core or .NET Core products and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact. oval:org.secpod.oval:def:78023 The host is installed with Visual Studio, ASP .NET core or .NET Core products and is prone to a brotli library buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact. oval:org.secpod.oval:def:78024 The host is installed with Visual Studio, ASP .NET core or .NET Core products and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to affect confidentiality, integrity and avai ... oval:org.secpod.oval:def:78760 The host is installed with Git before 2.35.2 or Microsoft Visual Studio 2017, 2019 or 2022 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow an unspecified impact. oval:org.secpod.oval:def:94448 ASP.NET Core - Security Feature Bypass Vulnerability. An unauthenticated attacker could bypass validations on Blazor Server forms. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then trigger an event that could exploit the vulnerability to save ... oval:org.secpod.oval:def:93609 HTTP/2 Rapid Reset Attack oval:org.secpod.oval:def:98459 Microsoft QUIC Denial of Service Vulnerability oval:org.secpod.oval:def:98407 .NET and Visual Studio Denial of Service Vulnerability. oval:org.secpod.oval:def:10000085 Visual Studio Denial of Service Vulnerability. Successful exploitation of this vulnerability requires an attacker to invest time in repeated exploitation attempts through sending constant or intermittent data. oval:org.secpod.oval:def:10000080 .NET and Visual Studio Remote Code Execution Vulnerability oval:org.secpod.oval:def:94444 ASP.NET Core Denial of Service Vulnerability. This vulnerability could be exploited if http requests to .NET 8 RC 1 running on IIS InProcess hosting model are cancelled. Threads counts would increase and an OutOfMemoryException is possible. oval:org.secpod.oval:def:94441 .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability. To exploit this vulnerability an attacker would have to inject arbitrary commands to the FTP server. The type of information that could be disclosed if an attacker successfully exploited this vulnerability would be access ... oval:org.secpod.oval:def:94447 Visual Studio Denial of Service Vulnerability. oval:org.secpod.oval:def:93654 Microsoft QUIC Denial of Service Vulnerability. The MsQuic server application or process will crash, resulting in a denial of service. oval:org.secpod.oval:def:91828 The host is installed with Visual Studio 2022 or .NET core runtime 6.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause denial of service. oval:org.secpod.oval:def:91826 The host is installed with Visual Studio 2022 or .NET core runtime 6.0 or .NET core runtime 7.0 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to run a specially crafted ... oval:org.secpod.oval:def:87537 .NET Framework Remote code execution Vulnerability. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. In order to exploit this vulnerability, an attacker or victim must execute code on the victim's machine. oval:org.secpod.oval:def:85415 The host is installed with Visual Studio and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact. oval:org.secpod.oval:def:10000083 GitHub: Remote Code Execution while cloning special-crafted local repositories. oval:org.secpod.oval:def:10000084 Recursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Execution. |