Page 2 of 12 results (0.013 seconds)

CVSS: 4.3EPSS: 1%CPEs: 7EXPL: 0

An information disclosure vulnerability exists when Visual Studio improperly discloses limited contents of uninitialized memory while compiling program database (PDB) files, aka "Microsoft Visual Studio Information Disclosure Vulnerability." This affects Microsoft Visual Studio. Existe una vulnerabilidad de divulgación de información cuando Visual Studio muestra incorrectamente contenidos limitados de memoria no inicializada cuando se compilan archivos PDB (Program Database). Esto también se conoce como "Microsoft Visual Studio Information Disclosure Vulnerability". Esto afecta a Microsoft Visual Studio. • http://www.securityfocus.com/bid/103715 http://www.securitytracker.com/id/1040664 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1037 • CWE-908: Use of Uninitialized Resource •

CVSS: 6.8EPSS: 15%CPEs: 7EXPL: 0

msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio before 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDB file. msdia.dll en Microsoft Debug Interface Access (DIA) SDK, distribuido en Microsoft Visual Studio anterior a 2013, no valida debidamente una variable no especificada antes de utilizarla para calcular una dirección de llamada dinámica, lo que permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un archivo PDB manipulado. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Debug Interface Access SDK. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDB files. The issue lies in a failure to sanitize a value which is then used in the calculation of an address for a dynamic call. An attacker can leverage this vulnerability to execute code under the context of the current process. • http://www.securityfocus.com/bid/67398 http://zerodayinitiative.com/advisories/ZDI-14-129 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 64%CPEs: 36EXPL: 0

Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5; Silverlight 5 before 5.1.20513.0; win32k.sys in the kernel-mode drivers, and GDI+, DirectWrite, and Journal, in Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT; GDI+ in Office 2003 SP3, 2007 SP3, and 2010 SP1; GDI+ in Visual Studio .NET 2003 SP1; and GDI+ in Lync 2010, 2010 Attendee, 2013, and Basic 2013 allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka "TrueType Font Parsing Vulnerability." Microsoft .NET Framework v3.0 SP2, v3.5, v3.5.1, v4, y v4.5; Silverlight v5 anteriores a v5.1.20513.0; win32k.sys en the kernel-mode drivers, y GDI+, DirectWrite, y Journal, en Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, y Windows RT; GDI+ en Office 2003 SP3, 2007 SP3, y 2010 SP1; GDI+ en Visual Studio .NET 2003 SP1; y GDI+ in Lync 2010, 2010 Attendee, 2013, y Basic 2013 permiten a atacantes remotos a ejecutar código a través de ficheros de fuentes TrueType manipulados, tambíen conocido como "TrueType Font Parsing Vulnerability." • http://www.us-cert.gov/ncas/alerts/TA13-190A https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-052 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-054 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17323 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17341 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 4.3EPSS: 58%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in Microsoft Visual Studio Team Foundation Server 2010 SP1 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka "XSS Vulnerability." Una vulnerabilidad de ejecución de comandos en sitios cruzados (XSS) en Microsoft Visual Studio Team Foundation Server 2010 SP1 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de parámetros no especificados. Se trata de un problema también conocido como "Vulnerabilidad XSS". • http://secunia.com/advisories/50463 http://www.securityfocus.com/bid/55409 http://www.securitytracker.com/id?1027511 http://www.us-cert.gov/cas/techalerts/TA12-255A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-061 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15779 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.9EPSS: 0%CPEs: 3EXPL: 0

Untrusted search path vulnerability in Microsoft Visual Studio 2008 SP1, 2010, and 2010 SP1 allows local users to gain privileges via a Trojan horse add-in in an unspecified directory, aka "Visual Studio Add-In Vulnerability." Vulnerabilidad de ruta de búsqueda no confiable en Microsoft Visual Studio 2008 SP1, 2010, y 2010 SP1 permite a usuarios locales conseguir privilegios a través de un caballo de Troya en un directorio especificado, también conocido como Visual Studio Add-In Vulnerability." • http://secunia.com/advisories/48396 http://www.securityfocus.com/bid/52329 http://www.securitytracker.com/id?1026792 http://www.us-cert.gov/cas/techalerts/TA12-073A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-021 https://exchange.xforce.ibmcloud.com/vulnerabilities/73537 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15081 •