CVE-2018-1037
https://notcve.org/view.php?id=CVE-2018-1037
An information disclosure vulnerability exists when Visual Studio improperly discloses limited contents of uninitialized memory while compiling program database (PDB) files, aka "Microsoft Visual Studio Information Disclosure Vulnerability." This affects Microsoft Visual Studio. Existe una vulnerabilidad de divulgación de información cuando Visual Studio muestra incorrectamente contenidos limitados de memoria no inicializada cuando se compilan archivos PDB (Program Database). Esto también se conoce como "Microsoft Visual Studio Information Disclosure Vulnerability". Esto afecta a Microsoft Visual Studio. • http://www.securityfocus.com/bid/103715 http://www.securitytracker.com/id/1040664 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1037 • CWE-908: Use of Uninitialized Resource •
CVE-2014-3802 – Microsoft DIA SDK msdia.dll Memory Corruption Vulnerability
https://notcve.org/view.php?id=CVE-2014-3802
msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio before 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDB file. msdia.dll en Microsoft Debug Interface Access (DIA) SDK, distribuido en Microsoft Visual Studio anterior a 2013, no valida debidamente una variable no especificada antes de utilizarla para calcular una dirección de llamada dinámica, lo que permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un archivo PDB manipulado. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Debug Interface Access SDK. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDB files. The issue lies in a failure to sanitize a value which is then used in the calculation of an address for a dynamic call. An attacker can leverage this vulnerability to execute code under the context of the current process. • http://www.securityfocus.com/bid/67398 http://zerodayinitiative.com/advisories/ZDI-14-129 • CWE-20: Improper Input Validation •
CVE-2012-0008
https://notcve.org/view.php?id=CVE-2012-0008
Untrusted search path vulnerability in Microsoft Visual Studio 2008 SP1, 2010, and 2010 SP1 allows local users to gain privileges via a Trojan horse add-in in an unspecified directory, aka "Visual Studio Add-In Vulnerability." Vulnerabilidad de ruta de búsqueda no confiable en Microsoft Visual Studio 2008 SP1, 2010, y 2010 SP1 permite a usuarios locales conseguir privilegios a través de un caballo de Troya en un directorio especificado, también conocido como Visual Studio Add-In Vulnerability." • http://secunia.com/advisories/48396 http://www.securityfocus.com/bid/52329 http://www.securitytracker.com/id?1026792 http://www.us-cert.gov/cas/techalerts/TA12-073A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-021 https://exchange.xforce.ibmcloud.com/vulnerabilities/73537 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15081 •
CVE-2011-1976 – Microsoft Visual Studio Report Viewer 2005 Control - Multiple Cross-Site Scripting Vulnerabilities
https://notcve.org/view.php?id=CVE-2011-1976
Cross-site scripting (XSS) vulnerability in the Report Viewer Control in Microsoft Visual Studio 2005 SP1 and Report Viewer 2005 SP1 allows remote attackers to inject arbitrary web script or HTML via a parameter in a data source, aka "Report Viewer Controls XSS Vulnerability." Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el control "Report Viewer" de Microsoft Visual Studio 2005 SP1 y Report Viewer 2005 SP1 permite a atacantes remotos inyectar codigo de script web o código HTML de su elección a través de un parámetro en una fuente de datos. También conocido como "Vulnerabilidad XSS en el control Report Viewer". Microsoft Report Viewer controls suffer from a cross site scripting vulnerability. Microsoft Report Viewer Redistributable 2005 SP1 and Microsoft Visual Studio 2005 Service Pack 1 are affected. • https://www.exploit-db.com/exploits/36020 http://marc.info/?l=bugtraq&m=145326307707460&w=2 http://www.securityfocus.com/bid/49033 http://www.us-cert.gov/cas/techalerts/TA11-221A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-067 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04945270 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12773 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2011-1280
https://notcve.org/view.php?id=CVE-2011-1280
The XML Editor in Microsoft InfoPath 2007 SP2 and 2010; SQL Server 2005 SP3 and SP4 and 2008 SP1, SP2, and R2; SQL Server Management Studio Express (SSMSE) 2005; and Visual Studio 2005 SP1, 2008 SP1, and 2010 does not properly handle external entities, which allows remote attackers to read arbitrary files via a crafted .disco (Web Service Discovery) file, aka "XML External Entities Resolution Vulnerability." El editor de XML en Microsoft Office InfoPath 2007 SP2 y 2010; SQL Server 2005 SP3 y SP4 y 2008 SP1, SP2 y R2; SQL Server Management Studio Express (SSMSE) 2005; y Visual Studio 2005 SP1, 2008 SP1, y 2010 no maneja correctamente entidades externas, lo que permite a atacantes remotos leer archivos arbitrarios a través de un fichero .disco (Web Service Discovery) manipulado, también conocido como "XML External Entities Resolution Vulnerability" • http://secunia.com/advisories/44912 http://www.securityfocus.com/bid/48196 http://www.securitytracker.com/id?1025646 http://www.securitytracker.com/id?1025647 http://www.securitytracker.com/id?1025648 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-049 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12664 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •