Page 24 of 263 results (0.010 seconds)

CVSS: 5.7EPSS: 14%CPEs: 3EXPL: 0

.NET Core and Visual Studio Information Disclosure Vulnerability Una vulnerabilidad de Divulgación de Información en .NET Core y Visual Studio A flaw was found in dotnet, where the System.DirectoryServices.Protocols.LdapConnection sends credentials in plaintext if the Transport Layer Security (TLS) handshake fails. This flaw allows an attacker to intercept sensitive information. The highest threat from this vulnerability is to confidentiality. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41355 https://www.oracle.com/security-alerts/cpujan2022.html https://access.redhat.com/security/cve/CVE-2021-41355 https://bugzilla.redhat.com/show_bug.cgi?id=2011487 • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 7.8EPSS: 3%CPEs: 2EXPL: 0

Visual Studio Remote Code Execution Vulnerability Una Vulnerabilidad de Ejecución de Código Remota en Visual Studio This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Visual Studio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DDS files. Crafted data in a DDS file can trigger an overflow of a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36952 https://www.zerodayinitiative.com/advisories/ZDI-21-1076 • CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Visual Studio Code Spoofing Vulnerability Una Vulnerabilidad de Falsificación de Código de Visual Studio • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26437 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Visual Studio Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios en Visual Studio This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Visual Studio. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Visual Studio installer. The issue results from incorrect permissions set on a resource used by the installer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26434 https://www.zerodayinitiative.com/advisories/ZDI-21-1077 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 5.5EPSS: 0%CPEs: 7EXPL: 0

.NET Core and Visual Studio Information Disclosure Vulnerability Una Vulnerabilidad de Divulgación de Información en .NET Core y Visual Studio • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34485 https://access.redhat.com/security/cve/CVE-2021-34485 https://bugzilla.redhat.com/show_bug.cgi?id=1990286 • CWE-732: Incorrect Permission Assignment for Critical Resource •