CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

microsoft

visual_studio

32 known vulnerabilities · sorted by CVSS score

CVE-2022-35825
HIGH8.8

Visual Studio Remote Code Execution Vulnerability

microsoft / visual_studio+7
Network
Published Aug 9, 2022
Page 1 of 2
CVE-2022-35826
HIGH8.8

Visual Studio Remote Code Execution Vulnerability

microsoft / visual_studio+7
Network
Published Aug 9, 2022
CVE-2022-35827
HIGH8.8

Visual Studio Remote Code Execution Vulnerability

microsoft / visual_studio+7
Network
Published Aug 9, 2022
CVE-2022-35777
HIGH8.8

Visual Studio Remote Code Execution Vulnerability

microsoft / visual_studio+6
Network
Published Aug 9, 2022
CVE-2025-49739
HIGH8.8

Improper link resolution before file access ('link following') in Visual Studio allows an unauthorized attacker to elevate privileges over a network.

microsoft / visual_studio+6
Network
Published Jul 8, 2025
CVE-2018-8599
HIGH7.8

An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly impersonates certain file operations, aka "Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability." This affects Microsoft Visual Studio, Windows Server 2019, Windows Server 2016, Windows 10, Windows 10 Servers.

microsoft / visual_studio+11
Local
Published Dec 12, 2018
CVE-2020-1257
HIGH7.8

An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly handles file operations, aka 'Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1278, CVE-2020-1293.

microsoft / visual_studio+15
Local
Published Jun 9, 2020
CVE-2021-1651
HIGH7.8

Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability

microsoft / visual_studio+15
Local
Published Jan 12, 2021
CVE-2021-1680
HIGH7.8

Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability

microsoft / visual_studio+15
Local
Published Jan 12, 2021
CVE-2021-28313
HIGH7.8

Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability

microsoft / visual_studio+12
Local
Published Apr 13, 2021
CVE-2020-1202
HIGH7.8

An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector or the Visual Studio Standard Collector fail to properly handle objects in memory, aka 'Diagnostic Hub Standard Collector Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1203.

microsoft / visual_studio+16
Local
Published Jun 9, 2020
CVE-2020-1393
HIGH7.8

An elevation of privilege vulnerability exists when the Windows Diagnostics Hub Standard Collector Service fails to properly sanitize input, leading to an unsecure library-loading behavior, aka 'Windows Diagnostics Hub Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1418.

microsoft / visual_studio+16
Local
Published Jul 14, 2020
CVE-2019-0727
HIGH7.8

An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector or the Visual Studio Standard Collector allows file deletion in arbitrary locations.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Diagnostic Hub Standard Collector, Visual Studio Standard Collector Elevation of Privilege Vulnerability'.

microsoft / visual_studio+14
Local
Published May 16, 2019
CVE-2021-28322
HIGH7.8

Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability

microsoft / visual_studio+12
Local
Published Apr 13, 2021
CVE-2020-1203
HIGH7.8

An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector or the Visual Studio Standard Collector fail to properly handle objects in memory, aka 'Diagnostic Hub Standard Collector Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1202.

microsoft / visual_studio+16
Local
Published Jun 9, 2020
CVE-2024-20656
HIGH7.8

Visual Studio Elevation of Privilege Vulnerability

microsoft / visual_studio+5
Local
Published Jan 9, 2024
CVE-2020-16874
HIGH7.8

<p>A remote code execution vulnerability exists in Visual Studio when it improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p> <p>To exploit the vulnerability, an attacker would have to convince a user to open a specially crafted file with an affected version of Visual Studio.</p> <p>The update addresses the vulnerability by correcting how Visual Studio handles objects in memory.</p>

microsoft / visual_studio+5
Local
Published Sep 11, 2020
CVE-2019-1232
HIGH7.8

An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly impersonates certain file operations, aka 'Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability'.

microsoft / windows_10+15
Local
Published Sep 11, 2019
CVE-2018-8172
HIGH7.8

A remote code execution vulnerability exists in Visual Studio software when the software does not check the source markup of a file for an unbuilt project, aka "Visual Studio Remote Code Execution Vulnerability." This affects Microsoft Visual Studio, Expression Blend 4.

microsoft / expression_blend+8
Local
Published Jul 11, 2018
CVE-2020-16856
HIGH7.8

<p>A remote code execution vulnerability exists in Visual Studio when it improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p> <p>To exploit the vulnerability, an attacker would have to convince a user to open a specially crafted file with an affected version of Visual Studio.</p> <p>The update addresses the vulnerability by correcting how Visual Studio handles objects in memory.</p>

microsoft / visual_studio+5
Local
Published Sep 11, 2020