9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
0.019 Low
EPSS
Percentile
88.5%
Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
CVE-2019-0537 warning
CVE-2019-0546 critical
CVE-2019-0548 warning
CVE-2019-0564 warning
CVE-2019-0545 warning
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4476698
support.microsoft.com/kb/4476755
support.microsoft.com/kb/4480056
support.microsoft.com/kb/4480961
support.microsoft.com/kb/4480962
support.microsoft.com/kb/4480966
support.microsoft.com/kb/4480973
support.microsoft.com/kb/4480978
support.microsoft.com/kb/4481480
support.microsoft.com/kb/4481481
support.microsoft.com/kb/4481482
support.microsoft.com/kb/4481483
support.microsoft.com/kb/4481484
support.microsoft.com/kb/4481485
support.microsoft.com/kb/4481486
support.microsoft.com/kb/4481487
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0537
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0545
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0546
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0548
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0564
statistics.securelist.com/
threats.kaspersky.com/en/product/Microsoft-.NET-Framework/
threats.kaspersky.com/en/product/Microsoft-Visual-Studio/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
0.019 Low
EPSS
Percentile
88.5%