Filtered by vendor Microsoft Subscriptions
Filtered by product Powershell Subscriptions
Total 19 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-36013 1 Microsoft 1 Powershell 2025-06-10 6.5 Medium
PowerShell Information Disclosure Vulnerability
CVE-2024-0057 2 Microsoft, Redhat 19 .net, .net Framework, Powershell and 16 more 2025-06-03 9.1 Critical
NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability
CVE-2022-34716 2 Microsoft, Redhat 5 .net, .net Core, Powershell and 2 more 2025-05-29 5.9 Medium
.NET Spoofing Vulnerability
CVE-2024-26190 1 Microsoft 8 .net, Powershell, Visual Studio 2022 and 5 more 2025-05-03 7.5 High
Microsoft QUIC Denial of Service Vulnerability
CVE-2024-21392 2 Microsoft, Redhat 4 .net, Powershell, Visual Studio 2022 and 1 more 2025-05-03 7.5 High
.NET and Visual Studio Denial of Service Vulnerability
CVE-2024-21409 1 Microsoft 16 .net, .net Framework, Powershell and 13 more 2025-05-03 7.3 High
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
CVE-2024-30045 2 Microsoft, Redhat 4 .net, Powershell, Visual Studio 2022 and 1 more 2025-05-03 6.3 Medium
.NET and Visual Studio Remote Code Execution Vulnerability
CVE-2025-21171 4 Apple, Linux, Microsoft and 1 more 7 Macos, Linux Kernel, .net and 4 more 2025-04-02 7.5 High
.NET Remote Code Execution Vulnerability
CVE-2022-41121 1 Microsoft 12 Powershell, Remote Desktop, Windows 10 and 9 more 2025-01-02 7.8 High
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2022-41076 1 Microsoft 11 Powershell, Windows 10, Windows 11 and 8 more 2025-01-02 8.5 High
PowerShell Remote Code Execution Vulnerability
CVE-2022-23267 3 Fedoraproject, Microsoft, Redhat 8 Fedora, .net, .net Core and 5 more 2025-01-02 7.5 High
.NET and Visual Studio Denial of Service Vulnerability
CVE-2022-26788 1 Microsoft 10 Powershell, Windows 10, Windows 11 and 7 more 2025-01-02 7.8 High
PowerShell Elevation of Privilege Vulnerability
CVE-2022-24512 3 Fedoraproject, Microsoft, Redhat 8 Fedora, .net, .net Core and 5 more 2025-01-02 6.3 Medium
.NET and Visual Studio Remote Code Execution Vulnerability
CVE-2023-21538 3 Fedoraproject, Microsoft, Redhat 5 Fedora, .net, Powershell and 2 more 2025-01-01 7.5 High
.NET Denial of Service Vulnerability
CVE-2021-43896 1 Microsoft 2 Cbl Mariner, Powershell 2024-11-21 5.5 Medium
Microsoft PowerShell Spoofing Vulnerability
CVE-2021-41355 2 Microsoft, Redhat 6 .net, Powershell, Powershell Core and 3 more 2024-11-21 5.7 Medium
.NET Core and Visual Studio Information Disclosure Vulnerability
CVE-2020-8927 7 Canonical, Debian, Fedoraproject and 4 more 12 Ubuntu Linux, Debian Linux, Fedora and 9 more 2024-11-21 5.3 Medium
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
CVE-2020-1108 2 Microsoft, Redhat 17 .net, .net Core, .net Framework and 14 more 2024-11-21 7.5 High
A denial of service vulnerability exists when .NET Core or .NET Framework improperly handles web requests, aka '.NET Core & .NET Framework Denial of Service Vulnerability'.
CVE-2020-0951 1 Microsoft 12 Powershell, Powershell Core, Windows 10 and 9 more 2024-11-21 6.7 Medium
<p>A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement. An attacker who successfully exploited this vulnerability could execute PowerShell commands that would be blocked by WDAC.</p> <p>To exploit the vulnerability, an attacker need administrator access on a local machine where PowerShell is running. The attacker could then connect to a PowerShell session and send commands to execute arbitrary code.</p> <p>The update addresses the vulnerability by correcting how PowerShell commands are validated when WDAC protection is enabled.</p>