Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Filtered by product Powershell
Total 19 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-34716 1 Microsoft 3 .net, .net Core, Powershell 2025-05-29 N/A 5.9 MEDIUM
.NET Spoofing Vulnerability
CVE-2025-21171 3 Apple, Linux, Microsoft 6 Macos, Linux Kernel, .net and 3 more 2025-02-05 N/A 7.5 HIGH
.NET Remote Code Execution Vulnerability
CVE-2024-21409 1 Microsoft 16 .net, .net Framework, Powershell and 13 more 2025-01-17 N/A 7.3 HIGH
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
CVE-2024-30045 1 Microsoft 3 .net, Powershell, Visual Studio 2022 2025-01-08 N/A 6.3 MEDIUM
.NET and Visual Studio Remote Code Execution Vulnerability
CVE-2022-41121 1 Microsoft 12 Powershell, Remote Desktop, Windows 10 and 9 more 2025-01-02 N/A 7.8 HIGH
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2022-41076 1 Microsoft 11 Powershell, Windows 10, Windows 11 and 8 more 2025-01-02 N/A 8.5 HIGH
PowerShell Remote Code Execution Vulnerability
CVE-2022-23267 2 Fedoraproject, Microsoft 6 Fedora, .net, .net Core and 3 more 2025-01-02 5.0 MEDIUM 7.5 HIGH
.NET and Visual Studio Denial of Service Vulnerability
CVE-2024-26190 1 Microsoft 8 .net, Powershell, Visual Studio 2022 and 5 more 2024-12-27 N/A 7.5 HIGH
Microsoft QUIC Denial of Service Vulnerability
CVE-2024-21392 1 Microsoft 3 .net, Powershell, Visual Studio 2022 2024-11-29 N/A 7.5 HIGH
.NET and Visual Studio Denial of Service Vulnerability
CVE-2024-0057 1 Microsoft 17 .net, .net Framework, Powershell and 14 more 2024-11-21 N/A 9.1 CRITICAL
NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability
CVE-2023-36013 1 Microsoft 1 Powershell 2024-11-21 N/A 6.5 MEDIUM
PowerShell Information Disclosure Vulnerability
CVE-2023-21538 2 Fedoraproject, Microsoft 3 Fedora, .net, Powershell 2024-11-21 N/A 7.5 HIGH
.NET Denial of Service Vulnerability
CVE-2022-26788 1 Microsoft 10 Powershell, Windows 10, Windows 11 and 7 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
PowerShell Elevation of Privilege Vulnerability
CVE-2022-24512 2 Fedoraproject, Microsoft 6 Fedora, .net, .net Core and 3 more 2024-11-21 6.8 MEDIUM 6.3 MEDIUM
.NET and Visual Studio Remote Code Execution Vulnerability
CVE-2021-43896 1 Microsoft 1 Powershell 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Microsoft PowerShell Spoofing Vulnerability
CVE-2021-41355 1 Microsoft 3 .net, Powershell, Visual Studio 2019 2024-11-21 2.9 LOW 5.7 MEDIUM
.NET Core and Visual Studio Information Disclosure Vulnerability
CVE-2020-8927 6 Canonical, Debian, Fedoraproject and 3 more 10 Ubuntu Linux, Debian Linux, Fedora and 7 more 2024-11-21 6.4 MEDIUM 5.3 MEDIUM
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
CVE-2020-1108 1 Microsoft 15 .net, .net Core, .net Framework and 12 more 2024-11-21 5.0 MEDIUM 7.5 HIGH
A denial of service vulnerability exists when .NET Core or .NET Framework improperly handles web requests, aka '.NET Core & .NET Framework Denial of Service Vulnerability'.
CVE-2020-0951 1 Microsoft 4 Powershell, Windows 10, Windows Server 2016 and 1 more 2024-11-21 7.2 HIGH 6.7 MEDIUM
<p>A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement. An attacker who successfully exploited this vulnerability could execute PowerShell commands that would be blocked by WDAC.</p> <p>To exploit the vulnerability, an attacker need administrator access on a local machine where PowerShell is running. The attacker could then connect to a PowerShell session and send commands to execute arbitrary code.</p> <p>The update addresses the vulnerability by correcting how PowerShell commands are validated when WDAC protection is enabled.</p>