8.8
CVE-2022-35777
- EPSS 0.47%
- Veröffentlicht 09.08.2022 20:15:12
- Zuletzt bearbeitet 29.05.2025 19:15:25
- Quelle secure@microsoft.com
- Teams Watchlist Login
- Unerledigt Login
Visual Studio Remote Code Execution Vulnerability
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Visual Studio Version2012 Updateupdate_5
Microsoft ≫ Visual Studio Version2013 Updateupdate_5
Microsoft ≫ Visual Studio Version2015 Updateupdate3
Microsoft ≫ Visual Studio 2017 Version >= 15.0 <= 15.9
Microsoft ≫ Visual Studio 2019 Version >= 16.0 <= 16.11
Microsoft ≫ Visual Studio 2022 Version17.0
Microsoft ≫ Visual Studio 2022 Version17.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.47% | 0.635 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
secure@microsoft.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.